
Your First Line of Defence
In a previous post, I told you about the importance of using HTTPS instead of HTTP. Today I will look at some of the functionality that HTTPS adds in the form of security headers.

In a previous post, I told you about the importance of using HTTPS instead of HTTP. Today I will look at some of the functionality that HTTPS adds in the form of security headers.

Is it easy to learn to program? If you google this, the results will be very confusing. The truth is that it is not easy – but you should still do it. You just need to be prepared.

What are functional interfaces and why are they used with lambdas? Lambdas and functional interfaces go hand-in-hand in Java. In this article we discuss some principles of functional interfaces.

You might have heard the term “data sanitisation” applied to devices. We need to permanently remove data on portable storage devices and hard drives before we get rid of them. But today I want to talk about a different form of data sanitization: input sanitisation. The question you need to answer is this:How
Ever since lockdown, the days seem to merge and blur. Despite the monotony – or maybe because of it – the weeks have passed quickly. It’s Monday, then it’s Friday, then it’s Monday again. And now it’s already past the middle of November.

You’ve heard the term, but what is a lambda and how do you use them in Java? This is a quick introduction to lambdas in Java.

This is a very important question. How do you know if something has gone wrong, or if your site has been compromised? The answer is that, unless you are logging and monitoring events, you don’t know. If you read about major data breaches, you’ll notice that often the data breach

In recent years, some companies have tried to make their contracts easier to read. Why? The Consumer Protection Act defines the right to plain and understandable language in consumer contracts.

A few days ago, ITWeb published an article about a program for software graduates. This upskilling programme will give seven interns a chance to work with senior developers over nine months. It’s a great idea. But it highlights two problems in the South African IT industry. Both problems are favourite topics of

You’ve visited a building where you need an access card. Without the card, you don’t get in. But the card doesn’t (or shouldn’t) open all doors once you are in the building. Some areas must be off-limits. That’s physical access control. Digital access control works on the same principle. It
Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)
Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.
If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com