Web Application Development

Software Design for Complex Technical Challenges

Application Security Services

Application Testing

  • Ethical Hacking
  • Application Penetration Testing
  • Mobile App Pen testing

Mitigating Risk

  • Static Testing of Source Code
  • Security Architecture Analysis
  • Hybrid Assessment

Remediation

  • Security Remediation Strategy
  • Incidence Response Strategy
  • Code Remediation

Training

  • Security Training for Developers
  • HIPAA Compliance Consulting
  • PCI Compliance Consulting

UX and Web Development Clients

Bloggery

DEV

Two-Phase Logging of Critical Events

Posted by alex on Dec. 12, 2016, 1:26 p.m.

Frequently, logging that an event has taken place is just as important as the event being triggered in the first place. Here's how to use two-phase logging in order to avoid any important gaps in your e-commerce code.

DESIGN

Presenting Your Design is a Lot Like Watching a Football Game (No It Isn't)

Posted by justin on Nov. 14, 2016, 9:58 a.m.

You’ve carefully crafted your designs after countless hours of user research, wireframes, and prototypes. There’s just one thing left to do: show it to your client. Let’s join NFL Commentator Phil Simms to find out how to leave your clients belittled and bemused.