
5 core security concepts learned from ‘The wolf and 7 young goats’
Once upon a time, there was a father reading fairy tales to his children. It so happens that the father

Once upon a time, there was a father reading fairy tales to his children. It so happens that the father

This 10-step grey-box pentest strategy has proven to not only be effective but also efficient – as it uses a

What is the driving force behind a systematic security testing approach? Let us imagine you are driving your car at

In a previous article I responded to the question Why test an app that is connected to avionics? In this

Security researcher Michael Myng found the keylogging code in software drivers that were preinstalled on HP laptops to make the

As software continues to eat the world, failures caused by bugs have never been more visible or higher profile. These

Aside from safety properties, can we use static analysis tools to detect security issues? Yes, as we will show by

Fuzz Testing or Fuzzing is establishing itself as the number one technique for highly automated software testing and is the

Quality Assurance (“QA”) is arguably the most critical aspect of safety-critical software. However, QA is rarely given the attention or

“Companies that embrace the principles of Software Factory (DevOps) experience 60 times fewer failures and can deploy 30 times faster