Matthew

Securing Legacy Applications

Securing Legacy Applications

Legacy applications. If there's one thing that...


Security for developers

Getting Developers to Care More About Security

Security, it's a topic that's become near and dear...


Best Practices for Secure Applications

10 Best Practices to Build Secure Applications

Recently, here on the blog, I've been talking...


essential steps for application protection

4 Essential Steps to Protect Web Applications

In our last article on OWASP Top 10 cheat sheet...


OWASP top 10 vulnerabilities cheat sheet for CTOs

OWASP Top 10 cheat sheet for startup CTOs

In recent times, hacks seem to be increasingly...


Security in review banner

Security In 2016 - The Year In Review

As 2017 is already off to a flying start, it's a...


continuous integration CI

How To Choose Your CI Tool

Software creation is a complicated process at...