Do we actually need penetration testing methodologies and how to figure out, which one to choose and how to use them? Read this article to find out.
The second part of the post devoted to factors of your business security. So let`s analyze several new related articles and see, how much has changed.
Have you read an excellent article on 13 secure design principles by Gary McGraw? In this post Vlad Styran shares his thoughts on that article.