Recent posts

Security Risk Assessments

Security Risk Assessments

Risk Assessments Who is Responsible for Downtime? If your cloud deployment becomes unavailable who is carrying the loss of service and business opportunity? What’s in Your App? Open Source Software Risk Your

Threat Modelling

Threat Modelling

Threat Modelling Threat modelling is a process of looking at the composite components of a web application and how data flows between them with the purpose of identifying areas of security weakness or