Related Content
Using Open Source Tools for Security Testing Performing a series of security tests before deployment of your application has become paramount. But that doesn't have to mean a suite of costly tools. Plenty of open source security testing tools have become viable options. Here's why you should consider open source tools for your different types of security testing. |
||
OWASP Releases Latest Top 10 IoT Vulnerabilities The growing list of internet-connected devices bring amazing benefits, but the sharing of valuable information that brings this convenience also brings security concerns. The Open Web Application Security Project has released its Top 10 Internet of Things 2018 list of the highest-priority issues. |
||
Protect Your Software through Threat Modeling Many software organizations are overwhelmed with a laundry list of vulnerabilities. They often have no idea where to start, how to determine prioritization, and whether or not those vulnerabilities accurately represent the threats to our applications, users, and data. Threat modeling is a simple yet effective solution. |
||
Fuel Your Force This Year with Help from Star Wars Embarking on yet another New Year’s program to transform your life? How about following the way of the Jedi to find your inner Force instead? The Star Wars Fuel Your Force program is about finding strength and balance in your life by taking inspiration from the Star Wars galaxy. |
||
5 Engaging Slack Communities for Software Professionals People all over the world can connect, ask questions, and share knowledge in real time in specialized Slack communities, including in niche channels for specific topics. Of course, there are a wealth of technology- and software-related Slack workspaces out there. Here are five communities that stand out. |
||
Better Check This List: Worst Passwords of 2018 We’ve embraced the IoT in our everyday lives, yet with so many connection points, there’s a risky habit too many of us still need to break—using weak passwords. SplashData evaluated more than five million passwords leaked online during the previous year and compiled the top worst passwords for 2018. |
||
5 Steps to Be More Productive There’s a common misperception that productivity implies getting more things done all at once. But it really means getting things done persistently at a moderate pace. You also don't need to change your routines drastically to be more productive. Even small changes can make a significant impact—like these five tips. |
||
4 Reasons Cybersecurity Is More Important Than Ever Ignoring cybersecurity risks can be disastrous. And as recent hacks and scams have shown, it is not only large organizations or corporations that are being targeted, but also the personal data of everyday people. Here are four reasons cybersecurity is more important than ever, as well as ways you can protect yourself. |