Our Blog
Home / Blog
Why DAST is the perfect fit for agile software projects
Every software development project is a delicate balancing act. To deliver the full project scope on schedule and within budget is challenging enough – but when you also have to make your application secure, you are now juggling four plates. Let’s see how a modern...
Excel 4.0 Macro: Old Feature, New Attack Technique
Excel 4.0 macro, also known as XLM 4.0 macro, is a benign record-and-playback feature of Microsoft Excel that was introduced back in 1992. This piece of programming code is a solution to automating repetitive tasks in Excel, but unfortunately, also a covert backdoor...
Web shells: How can we get rid of them and why law enforcement is not really the answer
Microsoft has recently seen many attacks by hackers using so-called web shells. The number of web shell attacks between August 2020 and January 2021 doubled compared to the same period a year earlier. But what are they exactly and how can you fight them?...
HOW TO IMPROVE CHANGE ADOPTION AND MANAGEMENT
Digital transformation has come a long way in the past year or so, but too many organizations are falling at the last hurdle. A lot of money has been invested in new technologies, but not enough time and planning is going into managing their adoption. The outcome of...
Diversity Podcast Project for Heightened Visibility
Diversity has been a popular topic for some time now and become an important requirement for companies in the meantime. All the differences and how we consciously deal with them in our society are in the focus. Diversity embraces different dimensions. These include...