DDoS attacks using IoT bots
Your smart thermostat might be plotting against you. Not literally, of course, but that innocent-looking device quietly regulating your home’s temperature could be part of a massive army launching cyberattacks…
Cloud, Cybersecurity, DevOps, AI
Your smart thermostat might be plotting against you. Not literally, of course, but that innocent-looking device quietly regulating your home’s temperature could be part of a massive army launching cyberattacks…
Your refrigerator is talking to your phone. Your doorbell is recording videos and storing them in the cloud. Your car knows where you’ve been, and your fitness tracker knows how…
In today’s world, security and privacy are more important than ever. From banking information to personal data, we all want to ensure that our information is kept safe and secure.…
Cybersecurity isn’t just the job of security teams anymore. With data breaches making headlines every week, developers need to think like attackers from day one. That’s where threat modeling comes…
The General Data Protection Regulation (GDPR) is a set of regulations designed to protect the personal data of individuals within the European Union (EU) and the European Economic Area (EEA).…
In today’s fast-paced digital world, it’s critical to have efficient cloud logging practices in place. Cloud logging refers to the process of collecting, analyzing, and storing log data from various…
Last month, I watched a small marketing agency lose three weeks of client work to a ransomware attack. The owner thought their basic antivirus software was enough protection. They were…
DevOps and DevSecOps are two of the most popular software development methodologies in the world today. While both approaches share some similarities, they also have significant differences in terms of…
Data breaches are happening everywhere. Just last week, another major company announced that millions of user records were compromised. Sound familiar? It should, because this story repeats itself with alarming…
Last week, I got a call from a client whose company had been breached three months ago. The scary part? They only just discovered it. Their traditional security toolsโfirewalls, antivirus,…
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.