Software Design for
Complex Technical Challenges

Application Security Services

Application Testing

  • Ethical Hacking
  • Application Penetration Testing
  • Mobile App Pen testing

Mitigating Risk

  • Static Testing of Source Code
  • Security Architecture Analysis
  • Hybrid Assessment


  • Security Remediation Strategy
  • Incidence Response Strategy
  • Code Remediation


  • Security Training for Developers
  • HIPAA Compliance Consulting
  • PCI Compliance Consulting

UX and Web Development Clients



Enums: The Good, the Bad, and the Ugly

Posted by alex on July 21, 2017, 9:30 a.m.

Enums have been in Python since version 3.4. They're not the newest kid on the block, but many 3rd party libraries (Django included) still don't natively support them. Let's discuss the advantages and disadvantages of the new Enum module vs a simple dictionary.


How Fusionbox addresses security as a core facet of its culture

Posted by Nasrullah on June 30, 2017, 2:22 p.m.

There's a misconception that security can be added with a product or service, or worked into an existing codebase as an afterthought. However, achieving security requires conscious thought at every step of designing and implementing software, and every decision should take security considerations into account.