We Build Secure Software

Software Development & Application Security Services

Find Out How

Application Security Services

Application Testing

  • Ethical Hacking
  • Application Penetration Testing
  • Mobile App Pen testing

Mitigating Risk

  • Static Testing of Source Code
  • Security Architecture Analysis
  • Hybrid Assessment

Remediation

  • Security Remediation Strategy
  • Incidence Response Strategy
  • Code Remediation

Training

  • Security Training for Developers
  • HIPAA Compliance Consulting
  • PCI Compliance Consulting

UX and Web Development Clients

Bloggery

DEV

Vim Survival Guide

Posted by julian.a on Aug. 18, 2016, 9:55 a.m.

Learning Vim can be intimidating at first, and most the beginner resources out there are trying too hard to show off the more sophisticated features of Vim rather than teach the basics. This survival guide for the total beginner should help get you started.

DEV

Novel Uses of Foreign-Key Constraints

Posted by gavin on July 7, 2016, 11:26 a.m.

I have been thinking about ways to increase data integrity in a relational database. I have found some interesting ways to use foreign-key constraints to that end. Here are some examples.