Some people say that data, rather than gold or oil, is the most valuable resource these days. Either way, it is definitely often the target of hackers, who might want to access it to sell, hold it hostage for a ransom, or simply destroy it to wreak havoc.
Continue reading “Developing secure systems (Part 2): Protecting data & passwords”Developing secure systems (Part 1): Why it matters
Security breaches, leaks, and other attacks feature in the news almost weekly, often as the result of insecure systems. While it will always be an arms race between attackers and “defenders”, there is actually a lot that can be done by any developer to significantly decrease the risk of being the next successful target.
Continue reading “Developing secure systems (Part 1): Why it matters”