Coen Goedegebure12 feb.12 minutenCYBER SECURITYSurviving a cyber security job interview (Cryptography)This article answers 14 typical questions about cryptography you may get during a job interview for a security position
Niels van Nieuwenburg8 aug. 20227 minutenSECURE CODING5 ways to improve your cyber security now - Software Developer editionYou probably hear it a lot: you should make your code secure! But… how? When it comes to security, there are a plethora of measures you...
Coen Goedegebure11 nov. 20214 minutenSECURE CODINGTrojans in your source codeBe aware of the dangers of hidden Unicode control characters and how they can make your source code appear differently than it is executed
Coen Goedegebure9 nov. 20213 minutenCYBER SECURITYWhy your company will be hackedThis article highlights a short list of common reasons why companies get hacked and why data breaches occur.
Coen Goedegebure1 nov. 20213 minutenHACKING5 Phases of hackingThe process of a typical attack scenario can be broken down into five distinct phases. This article describes the details of each phase.