Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development Evolution

Organizations can align their processes with one of two global industry standards for self-assessment and security maturity—BSIMM and OWASP SAMM.
The post Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development Evolutio… Continue reading Security Maturity Models: Leveraging Executive Risk Appetite for Your Secure Development Evolution

What is Extreme Programming (XP)?

Extreme programming (XP) is an agile methodology focused on enhancing customer satisfaction and product quality. Learn more about how XP can improve your development process. Continue reading What is Extreme Programming (XP)?

Why Use a Sensor When a Pseudo-Sensor Will Do?

Usually, when you need to sense something in a project, the answers are straightforward. Want to sense air temperature? There’s a sensor for that. Particulate content in the air? There’s …read more Continue reading Why Use a Sensor When a Pseudo-Sensor Will Do?

Is Australia’s Deep Tech Future in Space?

Australia is gearing up to play a big role in the future of space tech. For IT pros in areas as varied as AI, cyber security and game development, this is a big opportunity. Continue reading Is Australia’s Deep Tech Future in Space?