What are the phases of a Quality Penetration Test?So, you've hired a Penetration Tester, what should you expect?
Keeping up with Data BreachesA lightweight application to aggregate Data Breach news: Introducing The Breach Report
Doh! Understanding DeserializationSo what is Insecure Deserialization? Web applications, which we all use everyday, sometimes suffer from severe vulnerabilities. Bad...