It is interesting to see how companies and organizations believe that their mobile application source code is a protected asset. Protected asset due to compiled code files. With just a few tools and technics, it is surprisingly easy to decompile and withdraw a mobile application's source code.

NB! These are…

Zero Trust (ZT), Endpoint protection (EPP), and Cloud Access Security Broker (CASB) are topics this article will touch upon related to hardening an organization’s security in its modern IT-ecosystem.

As a result of global, national, and local regulations, workforces have been moved out of traditional office buildings, networks and into…

In today’s application development, it is common to encounter terms like microservices, containers, virtual machines (VMs), orchestrations, and last but not least cloud computing. I will, in corporation with Giridhar Srinivasan, give an introduction to these topics.


In the development of an app for your company, your product, or service…

This article will give you a small introduction to DevOps, DevSecOps, and DataOps.Let’s break the terms down to details:

· DevOps = Development and Operations.

· DevSecOps = Development, Security, and Operations.

· DataOps = Data and Operations.

Usually, these terms are associated with approaches to Software Development and IT-Operation…

Data security in Azure Cloud and SQL environment

What is better than automation and security while developing code and digital products?

“While the goal of DevOps Services automation is to help development teams in faster deployment and monitoring of applications, DevSecOps adds security to the automation and contributes to enhancing…

Sanna Diana Tomren

Passion for technology, from back-end code to leadership

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store