
Additive Testing: An Approach to Software Quality
In my last blog post, I discussed my favorite definition of “quality.” In it, I referred to Quality Assurance testers and some types of…
In my last blog post, I discussed my favorite definition of “quality.” In it, I referred to Quality Assurance testers and some types of…
I have been testing software for a lot of years: first as a power user of software that my company purchased, then as part of my job…
How it applies to Industrial Automation and Control Systems (IACS) and Operational Technology (OT) Control Systems
Big news in GovCloud came around last week as AWS announced Control Tower support in all GovCloud (US) regions. If this doesn’t seem that…
Today’s threat actors make use of a variety of information to tailor their attacks against organizations and individuals. By collecting…
When properly deployed and up-to-date, antivirus (AV) software is an important part of a defense-in-depth strategy to guard against…
Industrial Control Systems (ICS) and Operation Technology (OT) Control Systems are computer-based systems used to control physical…
Most penetration testers can tell you that they commonly see Secure Socket Shell (SSH), Remote Desktop Protocol (RDP), Network Basic…
An Early Obituary for MilCloud 2.0
At Hunter we focus enabling our customers to not just build software, but to create automated software factories where sustainable…
Whats a Hubzone Business? There exist hundreds of amazing businesses who can help the government save money while bringing jobs to the communities that need them the most.
Hunter Strategy, joins IT Schedule 70 with Cyber Security SINS