Most thinking around cybersecurity is dominated by the fear factor; what will happen to our company is our name is all over the internet in connection with a data breach or other cyberattack? In the second edition of the Cloakware Report we suggest that there is more to software protection than this…
There are hundreds of articles out there encouraging you to “secure” your software, and several tools that help you find and address security vulnerabilities in your software. No less an authority than CERT publishes a secure […]
In the latest Cloakware Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application. This simple demonstration captures the essentials […]
Continuous Integration, also know as CI, is an important part of modern software development. In fact it is a real game changer when Continuous Integration is introduced into an organisation, since it radically alters the way teams think about the whole development process.
We’ve just introduced a new Youtube video series by Cloakware Cate. Our Senior Architect, Catherine, will show you the tools and techniques hackers use to reverse engineer your apps in preparation for hacking your code, […]
As someone who works with cloud solutions for a security company, I am very aware of the stories in various media about security breaches in cloud accounts. Usually these are along the lines of “Company […]
Introduction While investigating new solutions I was spinning up POC’s and decided that instead of either making a new jumphost every time or adding manually the access to my existing jumphost I just wanted the […]