In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Racket: Scriblling In-Source Documentation

Modern systems have become increasingly complex since the beginning of the computing revolution. As these systems are programmed by humans, it is really easy to create systems with erroneous behavior. A well-documented code lowers the risks of introducing bugs in the programs – which should be something to always aim to. Read on to see how we here at Trustica approach this problem.

■ ■ ■