Web App Security

Has your website been hacked?

We must, and do, worry about the security of our web applications and our data. But don’t forget that a simple website can also be hacked. Often companies outsource their website development. This may be due to a lack of technical skills, or because they think it is a “marketing”

Continue reading →
Man holding a newspaper with the headline "The world is changing". Quote from Heraclitus: There is nothing permanent except change.

Snap, Crackle, POPI

The Protection of Personal Information Act (POPIA) goes live on 1 July 2021. It places a huge burden on all organisations — from the one-person accountant firm to the big banks.

Continue reading →

Four Things To Check NOW

We’ve looked at many topics over the past few weeks. It’s easy to delay taking action by focusing on the concepts. And with so much information, it can be difficult to know where to start. So today I am giving you a list of four things that you can –

Continue reading →

Building Better Security (8): RASP

I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So far we’ve looked at SAST, DAST and IASP.

Continue reading →
SDLC with Testing hightlighted and the word IAST

Building Better Security (7): IAST

I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So far we’ve looked at Static Application Security

Continue reading →
SDLC with Testing hightlighted and the word DAST

Building Better Security (6): DAST

I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. Last week we looked at Static Application Security Testing (SAST).

Continue reading →
SDLC with Testing hightlighted and the word SAST

Building Better Security (5): SAST

I’ve been sharing ideas on how to build security into your development process. An important step in the development process is testing. There are many techniques used in security testing. It’s useful to understand the different approaches, and their advantages and disadvantages. So for the next few weeks we’ll look at

Continue reading →
SDLC flow diagram with implementation highlighted

Building Better Security (4): Secure Coding Standards

I’ve been sharing ideas on how to build security into your development process. If you missed any of the previous articles, here are the links: Building Better Security – Part 1. Building Better Security – Part 2: Secure Analysis. Building Better Security – Part 3: Secure Design. This week I

Continue reading →
Diagram of SDLC with Design highlighted

Building Better Security (3): Secure Design

In this series, we look at how to build security into your development process: Building Better Security – Part 1. Building Better Security – Part 2: Secure Analysis. This week I look at how we can include security during the design phase.

Continue reading →

Thank You

We're Excited!

Thank you for completing the form. We're excited that you have chosen to contact us about training. We will process the information as soon as we can, and we will do our best to contact you within 1 working day. (Please note that our offices are closed over weekends and public holidays.)

Don't Worry

Our privacy policy ensures your data is safe: Incus Data does not sell or otherwise distribute email addresses. We will not divulge your personal information to anyone unless specifically authorised by you.

If you need any further information, please contact us on tel: (27) 12-666-2020 or email info@incusdata.com

How can we help you?

Let us contact you about your training requirements. Just fill in a few details, and we’ll get right back to you.