Thoughts, Insights, Ideas, Trends and Op-Eds

GDPR and Application Security: Why It’s Essential to Secure Your Applications Today

The General Data Protection Regulation (GDPR) came into effect within the European Union (EU) on May 25th of this year. This event got enterprises across Europe and beyond scrambling to stay compliant while going about their business as usual. At it’s most basic, GDPR can be described as a set of rules that are focused on protecting people’s data and privacy.

Read More...
Recent
Most popular
build app with MEAN stack in Vancouver

How to Interview a MEAN Stack Developer

So you’re looking to hire a MEAN stack developer for your bootstrap startup or established company and you’re going to conduct the interviews yourself. What questions should you ask to identify the candidate that will be a good fit for your team and project?
ecommerce project development

Seven Programming Languages Best Suited For eCommerce Solution Development

eCommerce has evolved significantly over the past decade and is expected to surpass a $2 trillion annual haul by the end of 2017, according to IBM. There are a lot of Content Management Systems (CMS), hosted solutions, and plugins freely available for you to set up your online retail presence.
10-Canadian-Tech-Startups-to-Watch-in-2018

10 Canadian Tech Startups to Watch in 2018

The Canadian tech ecosystem is booming with startups regularly attracting some serious investment. Many of these young companies are also showing that they can overcome early challenges and grow both revenue and personnel.

What Businesses Should Know About Whitelisting

In recent years, the popularity of open source frameworks and publicly released proof of concept techniques have contributed to the rise of cyber attacks. For example, Magento, a popular cloud-based e-commerce platform with an open-source ecosystem recently had almost a 1,000 compromised CMS admin panels.

How to Reduce Security Flaws and Vulnerabilities in the Software Code

Software today is often riddled with security flaws and vulnerabilities that bad actors can leverage to gain access to IT systems. In fact, according to a study (based on 268 penetration tests) conducted by security firm Rapid 7, only 16% of the software companies investigated were in the clear.