Software Coupling

Coupling refers the to strength of dependencies in your code. Coupling can be either explicit or implicit. For example, if an application has code that depends on other code that is coupling. If there are modules which depend on other modules that is coupling. Coupling occurs in many forms and is...

The Infamous Hats of Information Security

There are many different types of individuals and organizations that are involved in information security. Historically these have been referred to by a variety of names, but the most common are different colors of hats. The colors of hats are a metaphor for the different roles that people play in information security.

0 posts in total

    Threat Actors

    Threat actors are the individuals or organizations actively trying to compromise your systems. They are the bad guys. They are the ones who are trying to steal your data, your money, your identity, and compromise your systems.