Coding Matters

SDLC with Testing hightlighted and the word SAST

Building Better Security (5): SAST

I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So for the next few weeks we’ll look at

Continue reading →
Programmers and romance - imagae of two hands touching a heart against a background of code.

Programmers and Romance?

It’s that time of year again. I haven’t been to a shopping mall, but I did see chocolate hearts at the local Woolworths shop. So I’m sure heart decorations are out on display for Valentine’s Day everywhere. In the good old days of classroom training, we would give each delegate

Continue reading →
SDLC flow diagram with implementation highlighted

Building Better Security (4): Secure Coding Standards

I’ve been sharing ideas on how to build security into your development process. If you missed any of the previous articles, here are the links: Building Better Security – Part 1. Building Better Security – Part 2: Secure Analysis. Building Better Security – Part 3: Secure Design. This week I

Continue reading →
Static code analysis - image of tv test pattern

Static Code Analysis

Static code analysis is a form of testing. We use a static code analyser to analyse our code without running it, i.e. statically. Here is an example of static code analysis in Java.

Continue reading →

Hairdressers and Programmers

We’ve all had to learn new ways to do things during the pandemic. Before the hair salons re-opened, many people decided to cut their own hair. Youtube has about 50,000 matches for the search “cut your own hair during lockdown”. Of course, Youtube also has a few thousand videos about

Continue reading →
Diagram of SDLC with Design highlighted

Building Better Security (3): Secure Design

In this series, we look at how to build security into your development process: Building Better Security – Part 1. Building Better Security – Part 2: Secure Analysis. This week I look at how we can include security during the design phase.

Continue reading →
man falling down shiny blue tunnel

Beware of rabbit holes!

You might have heard the expression “to go down the rabbit hole”. It comes from the novel “Alice in Wonderland” written by Lewis Carroll in the 19th century. Alice falls down a rabbit hole, has quite a long trip, and lands in a strange place called Wonderland. A rabbit hole

Continue reading →

Thank You

We're Excited!

Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)

Don't Worry

Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.

If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com

How can we help you?

Let us contact you about your training requirements. Just fill in a few details, and we’ll get right back to you.