Our consultants have extensive experience in supporting and enabling teams to provide and deliver DevSecOps capabilities. This includes first hand experience in the following areas:
Training is specifically tailored to our clients’ needs, and where possible utilises their own systems and code for demonstration purposes.Learn More
This is a very detailed analytical process, involving deep inspection of an application, potentially including inspection of related systems or components depending on the purpose and scope of the engagement.
A review of the source code will typically involve both automated and manual techniques, incorporating steps from the OWASP Code Review Guide.
In addition, it may require deployment of the source code in a testing environment to allow dynamic analysis of sub-components and communication processes.Learn More