Continuous testing, continuous security

We have a very diverse team with strengths in different…


Securing open source software (Part 2)

Open-source software increases its presence in data…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…