4ARMEDinFull Stack SecurityScoping a penetration testI’ve been around application penetration testing for many years now and I’ve seen and heard many things when it comes to scoping a job…May 24, 2018May 24, 2018
4ARMEDinFull Stack SecurityRansomware Tips for Application DevelopersWe muse about a lot of potentially nefarious scenarios at 4ARMED, after all our job is to understand and anticipate IT security threats and…Jun 1, 2017Jun 1, 2017
4ARMEDinFull Stack SecurityBuild a Private Burp Collaborator Server on AWS with Terraform and AnsibleThis post will show you how to set up a Burp Private Collaborator Server using Terraform and Ansible on AWS.Apr 25, 2017Apr 25, 2017
4ARMEDinFull Stack SecurityHow to generate a Content Security PolicyContent Security Policy is a useful security addition to your web application but can be tricky to get started setting up. Until now.Dec 8, 2016Dec 8, 2016
4ARMEDinFull Stack SecurityThe Commoditisation of Penetration Testing“How the hell did you circumvent that security?” asked the systems architect in the Slack channel we had open for communication during the…Sep 5, 2016Sep 5, 2016
4ARMEDinFull Stack SecurityShould you Penetration Test Third Party SaaS Applications?More and more businesses are migrating internal functions to cloud-based SaaS applications but what assurance do you have over their…Mar 14, 2016Mar 14, 2016