Our Blog

Home / Blog

Why DAST is the perfect fit for agile software projects

Why DAST is the perfect fit for agile software projects

Every software development project is a delicate balancing act. To deliver the full project scope on schedule and within budget is challenging enough – but when you also have to make your application secure, you are now juggling four plates. Let’s see how a modern...

Excel 4.0 Macro: Old Feature, New Attack Technique

Excel 4.0 Macro: Old Feature, New Attack Technique

Excel 4.0 macro, also known as XLM 4.0 macro, is a benign record-and-playback feature of Microsoft Excel that was introduced back in 1992. This piece of programming code is a solution to automating repetitive tasks in Excel, but unfortunately, also a covert backdoor...

HOW TO IMPROVE CHANGE ADOPTION AND MANAGEMENT

HOW TO IMPROVE CHANGE ADOPTION AND MANAGEMENT

Digital transformation has come a long way in the past year or so, but too many organizations are falling at the last hurdle. A lot of money has been invested in new technologies, but not enough time and planning is going into managing their adoption. The outcome of...

Diversity Podcast Project for Heightened Visibility

Diversity Podcast Project for Heightened Visibility

Diversity has been a popular topic for some time now and become an important requirement for companies in the meantime. All the differences and how we consciously deal with them in our society are in the focus. Diversity embraces different dimensions. These include...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo