Toggle navigation
makumbi
Home
Archive
Blog Archive
August 2017
26 -
Application Denial of Service Vulnerability
July 2017
27 -
The Over Trusting Application User and the Need for Cyber Hygiene
May 2017
01 -
Bridge the Gap of Understanding Between Human Endpoints and Information Security Awareness
April 2017
14 -
OWASP Testing Guide - 'Test Early, Test Often'
March 2017
26 -
Why a business should consider migrating its enterprise IT systems into the cloud infrastructure
08 -
Incident Management and Patch Management
04 -
Incident Management Response
February 2017
26 -
Sensitive Data Exposer: Black Box and White Box Test Cases
19 -
Tools for Enforcing Secure Code
12 -
Threat Modeling
05 -
Secure Software Design
04 -
Personal Identifiable Information (PII)
January 2017
29 -
Requirements Misuse and Abuse Cases
21 -
Software Development Life Cycle (SDLC) Training
14 -
Software Development Life Cycle (SDLC) Process Comparison
08 -
Software Vulnerability - SQL Injection
December 2016
17 -
Database Comparison: Oracle 12c vs. Amazon DynamoDB
January 2016
04 -
The optimistic view of 2016