Leonard BasseinCrashtestSecHow to choose and implement a great vulnerability assessment tool…the project of web application security will never be truly finished!Feb 18, 2019Feb 18, 2019
Leonard BasseinCrashtestSecHow you can generate a positive ROI through web application securityThe fact, that Cyber Crime is a serious threat and is becoming more and more costly and dangerous for companies is widely known by now…Jan 28, 2019Jan 28, 2019
Leonard BasseinCrashtestSecHow all organisations can learn from the hacking attack on politicians & public figuresPoliticians seem to enjoy the new ways of communication they can have through the internet. Communication is no longer a one way street…Jan 15, 2019Jan 15, 2019
Leonard BasseinCrashtestSecThe 5 Stages of a Data BreachAccording to the 2018 Global Risk Report the World Economic Forum released this year, Cyberattacks are amongst the Top 5 Risks for Global…Nov 13, 2018Nov 13, 2018
Leonard BasseinCrashtestSecThe 6 most important web vulnerabilities that managers need to take care ofThe world of IT security can get confusing with all the different vulnerabilities, exploits and newly emerging trends. In this article we…Sep 28, 2018Sep 28, 2018
Leonard BasseinCrashtestSecSecDevOps — No agility without securityThe concept of DevOps and agility is nothing new for most companies and developers circling the sun. The most well known frameworks (e.g…Aug 17, 2018Aug 17, 2018
Leonard BasseinCrashtestSec7 Signs that your Website has been hackedThe times when hacking attacks were unusual and only happened to big companies are over. Hacking private people and small or medium-sized…Jul 26, 2018Jul 26, 2018
Leonard BasseinCrashtestSec5 Takeaways for Start-ups from CEBIT 2018“The first CEBIT of a new era” as Oliver Frese (Member of the Board of Deutsche Messe AG) called it. A pretty bold statement in advance of…Jun 22, 2018Jun 22, 2018