Your external security consultant just sent you the vulnerability report from the last test you ordered? What shall you do with all those findings and how to successfully communicate with the concerned parties? What could go wrong and why?
BITS is The Financial Services Roundtable technology division. At the end of January 2012 BITS issued a document containing detailed framework regarding the integration of the basic security principles in the software development life cycle.It is called “BITS Software Assurance
Sorry, this entry is only available in Български.
The software is everywhere those days, and unfortunately bad codding practices together with tight schedules and demanding market brings tones of vulnerabilities. Of course there are people that are happy to find out the holes and exploit them. CWE recently
For a long time I’ve retained myself from commenting on the HBGary case. And that’s because everyone already spoke out – louder and not that louder – their own opinions. So I thought that everything on that theme is already
Few days ago I had several conversations with different people on the same topic – social networks and the result of growing exhibitionism trends out there. Hopefully that article could bring some light on how powerful sources a social network
No matter if you want to be the best technical guru or you dream of becoming the greatest IS manager the information what is going on the other side will always keep you well balanced. This is the main idea