Blogposts about cyber security in general, pentest, cloud security and red teaming from our team.
This article highlights the six criteria, defined by the BSI, that need to be considered in a pentest.
Pentests can be carried out by an analyst on site or remotely. This article is intended to explain the advantages and disadvantages of the 2 options.
However, a compromised digital application can lead to reputational damage by inadvertently exposing the user's digital life.
Timeboxing is a central concept of agile software development and is being used in more and more areas. Basically, a timebox refers to the time you have to complete a task.
Open Source Intelligence, or OSINT for short, refers to the collection of information from public sources for use in the context of intelligence.
There are numerous aspects to consider when developing apps securely. One of them is whether to choose a native app or a hybrid app.
Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment: