By using this web site you accept our use of cookies. More information about cookies
Accept
Infopulse - Expert Software Engineering, Infrastructure Management Services
By using this web site you accept our use of cookies. More information about cookies
Accept
Infopulse - Expert Software Engineering, Infrastructure Management Services
Infopulse - Expert Software Engineering, Infrastructure Management Services
reCAPTCHA
Send message Please fill in this quick form and we will send you a free quote shortly.
* Required fields
Your privacy is important to us. We will never share your data.
Subscribe to our updates Be among the first to get exclusive content on IT insights, innovations, and best practices.
* Required fields
Your privacy is important to us. We will never share your data.
Subscribe to our New openings Please fill in this quick form to be among the first to receive our updates.
* Required fields
Your privacy is important to us. We will never share your data.
Default avatar Send an email to person Please fill in this quick form to contact our expert directly.
* Required fields
Your privacy is important to us. We will never share your data.
Infopulse - Expert Software Engineering, Infrastructure Management Services
Read the Full Case Study Don't miss the most interesting part of the story!
Submit this quick form to see the rest and to freely access all case studies on our website.
* Required fields
Your privacy is important to us. We will never share your data.

Cybersecurity

December 19, 2018  |  Cybersecurity  |  Andrii Bozhok
Pentester’s Training and Practice: Buffer Overflow for Newbies

A lot has already been written on Buffer Overflow: extensive guides, workshops and instructions on what to do and how. We present our first article in the “Pentester’s training and practice” series, where we’ll focus on some specifics of pentesting art and frequent mistakes.

Read more
August 15, 2018  |  Cybersecurity  |  Oleg Diachuk
Guide to Modern Penetration Testing [Part 2]: Choose Your Box

So you need a Penetration Testing Service, and now you question yourself: should I go with a Black Box testing? Wait; there are other “colors” as well? Selecting a proper method of security testing might become a chore if you don’t know the difference.

Read more
August 08, 2018  |  Cybersecurity  |  Oleg Diachuk
Guide to Modern Penetration Testing [Part 1]: Two Extreme Cases

In the recent years, penetration testing services have gained a rightful place in the information security market. Despite some minor issues in this branch of security assessment, pentests are widely regarded as one of the most important cybersecurity measures, required for a proper protection against cyberthreats.

Read more
1 2 3 4