As developers, we have as focus to think about applications that are more and more secure, more and more efficient in keeping user data…
When we look at the development world and its evolution in the last few years, we can say that one of the fields that had least followed the…
Before we start talking about Perfect Forward Secrecy (PFS), let’s understand a little bit about the context of how we got here. In…
We already know that some IT paradigms must be rethought when we look at the world of cloud security. Identity Access Management is one of…
In our first article – Is your container really secure? on security of containers, we questioned whether the containers we are used to…
In recent years, the use of containers to pack and deliver our applications has become increasingly present in development processes.
OWASP is one of the best sources of knowledge for all professionals who wish to work with software development, and to have a robust…
When we think of a supply chain, a company in the industrial area and its factory receiving its raw materials soon comes to mind. This…
Peter Drucker once said, “That which is not measured, is not improved.” He’s right – what we can’t understand…