hacking

Articles

Cyber Security Test Warriors Cyber Security Test Warriors: Where Might You Take Your Career?

Do you know the latest in test attacks and testing techniques to become a cyber security test warrior? Becoming one is probably not for everyone, but the need is real, continues to grow, and offers a career opportunity for those brave enough to take the challenge.

Jon Hagar's picture Jon Hagar

Interviews

Get to Know Google's Hacking Database: An Interview with Kiran Karnad
Podcast

Kiran Karnad, a contributor to the Google Hacking Database, tells us what the database is, how it was started, and how to utilize it to its fullest potential—just like black-hat hackers. Learn why this tool is an invaluable resource for helping protect your software from evil.

Noel Wurst's picture Noel Wurst
Enhancing Mobile Data Security: An Interview with Erik Costlow

In this interview, Erik Costlow reveals some of the ways that today's hackers are using mobile apps to steal information not just from business, but also directly from mobile device users themselves. Erik also shares with us how device security should never be taken for granted by developers.

Noel Wurst's picture Noel Wurst

CMCrossroads is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.