Cyber Security Blog

  • Authentication mechanisms image

    A Comprehensive Guide On Access Control Models Access control models are essential for maintaining the security and integrity of systems by controlling who can access what within an organization. These models define how permissions are granted and who has control over these permissions. In this guide, we’ll explore the different access control models, starting with…


  • The KISS principle

    What is the KISS Principle The KISS (keep it simple, stupid or keep it stxpid simple) principle encourages designers, developers, and engineers to prioritize simplicity in their work. Whether you’re building a product, designing a website, or writing a block of code, simplicity should be your guiding star. Complexity, while sometimes necessary, often leads to…


  • Software Development Life Cycle image

    What is the Software Development Life Cycle (SDLC)? The Software Development Life Cycle (SDLC) is a structured process used to design, develop, test, and deploy software. It serves as a roadmap for software development, breaking the process into specific stages like requirement analysis, design, development, testing, implementation, documentation, and evaluation. Each stage has clear tasks…


  • Piscium Security Logo

    State of the Info Stealers Info stealers are a type of Trojan that reside on a computer in order to collect information to deliver to the attacker. Typically these attacks target credentials that can be found on sites such as financial services and social platforms, they can also steal information from emails, VPN credentials, browser…


Subscribe to our blog

Receive relevant information for you company

Don’t lose the opportunity to checkout the latest news

Be the first to know about what is happening in the world