Visit our Business blog


0 0 52

How to develop more secure web apps

This week on our blog, we have a guest post from Nathan Britton, Principal Consultant at NTT Security.

Web applications are key to any...

Read More…

1 0 31

Detecting malware through static and dynamic techniques

Malware analysis involves two key techniques: static analysis and dynamic analysis.

Static analysis examines malware without actually...

Read More…

0 0 91

Equifax breach impacts consumers and businesses, globally

This blog is credited to Derek Weakley, a valued manager of the U.S. Information Security Architecture team.

Identity verification methods...

Read More…

0 0 9

Are your security guards too trusting?

On nearly every assessment I have performed, I have been able to piggyback my way into target buildings and sensitive areas. If you walk...

Read More…

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.