Filter posts by category

ISO 27001

Why Compliance Matters

In today’s digital age, safeguarding sensitive information is critical for all businesses, especially those dealing with data-heavy operations. ISO 27001, a globally recognized standard for information security management, provides a robust framework for securing data, mitigating risks, and demonstrating a commitment to cybersecurity. Why ISO 27001 Matters for Canadian Businesses Canadian businesses, from small startups […]

Why Compliance Matters Read More »

Business

AI Fuzzing

Fuzzing is the art of automatic bug detection. The goal of Fuzzing is to stress the application and cause unexpected behavior, resource leaks, or crashes.  Fuzz testing, or fuzzing, is a Black Box software testing technique that basically consists of finding implementation bugs using malformed or semi-malformed data injection in an automated fashion. A fuzzer

AI Fuzzing Read More »

Tutorial, Framework
FedRAMP Logo

FedRAMP

FedRAMP was created in 2011 to help the federal government adopt and use cloud services cost-effectively and risk-basedly. FedRAMP allows agencies to use modern cloud technologies to secure federal data.

FedRAMP Read More »

Framework

Threat Modeling

Threat modeling, is a specialist profession that is closely related to software and application development. It encompasses the systematic identification, analysis, and mitigation of security risks and vulnerabilities within an application or system. This methodical approach involves identifying and prioritizing potential threats, evaluating the effectiveness of mitigations, and enhancing the application’s overall security posture. A

Threat Modeling Read More »

Tutorial, Framework, Technologies

What is FIDO

FIDO (Fast Identity Online) is a set of open and standardized authentication protocols developed by the FIDO Alliance. This nonprofit organization seeks to standardize authentication at the client and protocol levels. This is intended to eliminate passwords that are often ineffective and outdated from a security standpoint. The FIDO protocol uses standard public key cryptography

What is FIDO Read More »

Technologies