Coding Matters

Trust is a scarce commodity

Tom deMarco and Timothy Lister wrote a superb book called “Peopleware: Productive Projects and Teams”. It’s a book that has had a profound influence on software management. It is a book you must read, and read again. The premise is clear: the real issues in software development are human, not technical.

Continue reading →

Building Better Security (8): RASP

I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So far we’ve looked at SAST, DAST and IASP.

Continue reading →

Think about the teacher

The DBE planned robotics curriculum On 26 Feb 2021, ITWeb reported that the Department of Basic Education will pilot its coding and robotics curriculum in schools this year. I don’t have a child at school, but I still have concerns about this.

Continue reading →
SDLC with Testing hightlighted and the word IAST

Building Better Security (7): IAST

I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So far we’ve looked at Static Application Security

Continue reading →

Is the absence of an answer actually the answer?

Most of us in IT are working long hours. There are always more fires to put out, and less time to prevent the fires from starting in the first place. But we all know that sometimes we must spend time on what is important, even if it isn’t urgent. Which is why I’m

Continue reading →
SDLC with Testing hightlighted and the word DAST

Building Better Security (6): DAST

I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. Last week we looked at Static Application Security Testing (SAST).

Continue reading →

Thank You

We're Excited!

Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)

Don't Worry

Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.

If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com

How can we help you?

Let us contact you about your training requirements. Just fill in a few details, and we’ll get right back to you.