Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

Reproducing the vulnerabilities documented in a pentest report is a common engineering pain point. But aligning developer skills with the tooling used during the pentest can help confirm issues faster, and deploy fixes faster. The Tools Of The Trade Bu… Continue reading Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

Tips From a Hacker to Keep Smartphones Safe

We can do many things using our mobile devices: hail a taxi, book a hotel, send and receive money, purchase goods online or in-store, chat and share media files, control other devices (such as door locks or security cameras) and more. But then there’s… Continue reading Tips From a Hacker to Keep Smartphones Safe

Who installs Zoom apps outside the Play Store? Well, lots of people.

Video conferencing platform use has skyrocketed as people turn to remote work and e-learning, and Zoom has witnessed a tremendous surge in popularity. This popularity, though, has brought increased scrutiny that has revealed several issues with the pla… Continue reading Who installs Zoom apps outside the Play Store? Well, lots of people.

Advancing Application Delivery

Are you in an organization implementing Continuous Delivery? Are you a manager who wants to see your applications respond at the pace of the market – or better, be in front of the market? Do you envision a world where updates are available to cust… Continue reading Advancing Application Delivery