15.3 C
Munich
Friday, April 26, 2024
- Advertisement -

ARCHIVE

Yearly Archives: 2022

Top Qualities of a Successful CISO

Sitting on the CISO chair is similar to sitting on the throne made of swords in Game Of Thrones. It is meant to be...

A Simple Guide To Secure IoT Devices

The Internet of Things (IoT) refers to the growing network of small, low-powered devices such as sensors and controllers that are connected to the...

Understand And Reduce Your Attack Surface

The attack surface of your organization can be defined as all the possible entry points an attacker may try to exploit to gain access...

Top Tools For Kubernetes Security

Container technology has become increasingly popular and the use of docker makes it even easier to develop, ship, and run applications using containers. Kubernetes is...

Apple Announces New Security Features

Apple has announced the introduction of three new advanced security features focused on protecting against threats to user data in the cloud. “At Apple, we...

Top 10 CI/CD Security Risks Guideline From OWASP

Continuous integration (CI) and continuous delivery (CD), also known as CI/CD, embody a culture, operating principles, and a set of practices that application development...

What Is The Difference Between GWAPT and OSWE Penetration Testing Certifications

GWAPT and OSWE are among the top certifications in security and are mainly built for penetration testers. Let's look at the differences between the two...

Rackspace Hosted Exchange Hit By Ransomware

Rackspace's hosted Microsoft Exchange environments were affected by a "security incident" which has knocked out email services to their customers. The Company Rackspace is one of...

Pentagon Supply Chain Fall Short Of Meeting Cybersecurity Requirements

Nation-state hackers are targeting defense contractors with sophisticated cyberattack campaigns in order to gain access to information sensitive to national security. A recent independent study...

Most Organizations Still Vulnerable To The Log4j Vulnerability

A study examining the scope and impact of the recent Log4j vulnerability has been conducted by Tenable and the results are extremely interesting. According to...

Latest news

- Advertisement -