Our company’s nearly one million customers trust us to deliver secure products and services, from payroll and bookkeeping to document sharing and software management. With such sensitive customer information at play, it’s vital that no vulnerabilities get missed, which is what led Visma to invite hackers to help them secure their digital assets.
Visma's Bug Bounty by Ioana Piroska
Each company launches a software and they support it on different operating systems, but as times goes by, the different operating systems reach their end of life and then the software has to be moved to new operating systems. While you can still run your software on an unsupported operating system, the problem will arrive once you no longer receive patches for different vulnerabilities that will be exploited.
Life cycle of the OS by Alexandru Mircea Pastiu
Chances are that at some point, regardless of situation, a solution will either be upgraded, changed, decommissioned or a migration will occur. In this article we will dissect the different components involved in a solution, that will help us identify the lifelines tied to the solution, enabling us to produce smaller chunks of workload and work in an agile manner.
Legacy systems by Rolland Varga