What is White Hat Hackers?

What does White Hat Hacker Mean? A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and access their security. All hackers are not malicious. The skills of some of the hackers are used to protect the systems or networks against attackers. The skills of the hackers used […]

From Privacy to Trust and ROI

As we embark on a new decade, data privacy has become top-of-mind for business executives and consumers worldwide.  Data breaches frequently expose the personal data of millions, and many companies have not done enough to protect themselves from intentional or unintentional misuse. While it is often hard to reach agreement on new legislation, one issue […]

The Art of Secure Code

We think a high-quality and highly secure app is a work of art. As with any artistic endeavor, it takes creativity, resources, training, and talent to create secure code. Maybe it’s a little bit of stretch to compare your software developers to Picasso, but we would argue that there are a lot of similarities between […]

Java Crypto Libraries Go Modular

To complement my recent Java Crypto blog series (“How to get Started Using Java Cryptography Securely“, “Cryptographically Secure Pseudo-Random Number Generator (CSPRNG)“, “Encryption and Decryption in Java Cryptography“, “Message Digests, aka Hashing Functions“), I have been referencing corresponding working code on the GitHub repository. I am happy to announce a brand-new, shiny, modularized, micro-serviced, and […]