Code on a computer screen

Replaying Security: From Manual Test Requests...

Preparing for another day Kalles Group Pen Tester Stan Steenhuis, describes how the investment in constructing custom test requests can be turned into repeatable scripted tests. By adding this...

Read More

InfoSec and the Great IoT Gold Rush

Author: Sean Rosenberger The IoT gold rush Generally seen as taking off in 2009, the presence of the Internet of Things (IoT) grew at a furious pace with approximately 10 billion devices on the...

Read More

What everyone needs to know about the Equifax...

Author:  Nic Baus Everyone knows how precious your credit rating can be and how much it can swing you getting a loan for a house, car or even a simple retail credit card. There are three major...

Read More

What Happens When You Incorporate Artificial...

By Todd Barnes For those of you that may know Springfield does not refer to the lovely locale in Illinois, Missouri or even Oregon for that matter. Springfield for my context refers to the code...

Read More

Five Security Mistakes and How to Prevent Them

Sometimes it’s just a matter of changing your password more often. Security breaches have become distressingly common in recent years, compromising everything from employment records (security...

Read More

Technical Brief: Oracle HRMS and Automation of...

Author: Chandra Aitha In most organizations, a primary responsibility of the Identity and Access Management group is to provision new users in Active Directory and Exchange, modify existing users,...

Read More