Developing secure systems (Part 2): Protecting data & passwords

Developing secure systems (Part 2): Protecting data & passwords
  1. Developing secure systems (Part 1): Why it matters
  2. Developing secure systems (Part 2): Protecting data & passwords
Developing secure systems (Part 2): Protecting data & passwords

Some people say that data, rather than gold or oil, is the most valuable resource these days. Either way, it is definitely often the target of hackers, who might want to access it to sell, hold it hostage for a ransom, or simply destroy it to wreak havoc.

Continue reading “Developing secure systems (Part 2): Protecting data & passwords”

Developing secure systems (Part 1): Why it matters

Developing secure systems (Part 1): Why it matters
  1. Developing secure systems (Part 1): Why it matters
  2. Developing secure systems (Part 2): Protecting data & passwords
Developing secure systems (Part 1): Why it matters

Security breaches, leaks, and other attacks feature in the news almost weekly, often as the result of insecure systems. While it will always be an arms race between attackers and “defenders”, there is actually a lot that can be done by any developer to significantly decrease the risk of being the next successful target.

Continue reading “Developing secure systems (Part 1): Why it matters”