October 2014

Category //

October 2014

Secure SDLC

What exactly is the SDLC? Organizations developing applications have in-place a process by which each application is designed, developed, tested, and deployed. This sequence of stages that define these processes  is called the software development lifecycle, often referred to as the … Read More

Read More »

Spoofing Attack

What is a Spoofing Attack? A spoofing attack is when an attacker or malicious program successfully acts on another person’s (or program’s) behalf by impersonating data.   takes place when the attacker pretends to be someone else (or another computer, device, … Read More

Read More »
Skip to content