• Secure source code review: In detail Secure source code review comes into action during the stages of software development. Before diving into the topic, try recalling the stages in the Software Development Life Cycle (SDLC) process? An SDLC process starts from Planning, Analysis, Design and Development towards Testing, Implementation and Maintenance. But what about the […]

  • Threat Hunting? What exactly is a Threat? Living in a connected space, ever thought about how safe your organization stand against information security incidents? Or what is the root cause of these security events? Here is where organizations must understand the term Threats and how they could flame your existing infrastructure weaknesses. A threat is […]