News

Effective Threat Modeling for Software Applications

While the industry continues to lean heavily on automated scanning tools, the reality remains that security breaches do not result only by mere coding errors; they can also point to significant structural gaps in your application logic. For many developers, security is often perceived as a tedious administrative hurdle. In a professional development environment, however, it must be viewed as a…
Read more
C++News

C++, LLVM, and Cybersecurity

How are these three words related? C++ is a language, LLVM is a compiler infrastructure. Cybersecurity is a whole different beast. Sometimes experienced engineers say that C++ is incompatible with the term “cybersecurity” and should be replaced with safer languages. We…
News

Regulated Software Security - The Audit Survival Guide

In regulated environments, the term “secure” implies the ability to run, explain, and change safely over time. That’s a very different bar than “we passed a pen test once” or “we use a safe framework.” If you build software for finance, healthcare, public…
DelphiNewsRAD Studio

RAD Is Not No Code

We’re very lucky to have so many passionate users of Delphi. Among them, of course, are our MVPs who are not only very experienced and talented developers, but also have many other skills. For example, many post on social media like Instagram. Reddit, and Facebook…