Cyber Security

Securing the Future: DevSecOps and OWASP SAMM in the Era of technical revolution

Posted on by  
Mike van der Bijl

In the era of unprecedented digitization, where technology deeply penetrates into our society and organizations, software has become the driving force behind progress. No matter which industry, almost every organization is increasingly dependent on software applications. The goal? Optimizing business processes, providing seamless user experiences, and creating new opportunities. The crucial detail of this revolution: high-quality software is essential for the success and resilience of businesses and organizations.

However, this is the part where we encounter an interesting paradox: digitization is not only an enormous opportunity, also a threat. Cyber threats are evolving at an alarming rate. Attackers constantly seek vulnerabilities to infiltrate systems and steal sensitive data. Ensuring the security of software is no longer a choice, but an absolute necessity.

Continue reading →

Surviving a cyber security job interview (Cryptography)

Posted on by  
Coen Goedegebure

This article answers 14 typical questions about cryptography you may get during a job interview for a security position or any IT-related assignment for that matter.

When working in IT, it is easy to skip over and assume the correctness of certain often used technologies. Especially in the field of cryptography it is a good idea to not try and reinvent the wheel, but use well maintained libraries and proven technology. However, to really advance in any IT field, it is important to understand the details of the technologies you work with. That is why during a job interview, the basic topics are often covered to probe the applicant’s knowledge level of the technical part of the job he or she is applying for.

Continue reading →

5 Phases of hacking

Posted on by  
Coen Goedegebure

An ethical hacker follows a similar process to that of a malicious hacker to gain and maintain access to a computer system. The process of a typical attack scenario can be broken down into five distinct phases, which are described in this article.

Continue reading →

shadow-left