Learn about the different layers of the cybersecurity stack, including the pros and cons of each layer and why each layer is essential to secure an embedded system. Attacks that target IIoT can be devastating. We'll review the infamous Stuxnet…
Lately I've been reflecting back on the last couple of years when I used to be in a DevOps focused role. As many of you may already know DevOps is more about the way we work as developers and operational folk rather than a job role. So when dealing…
In January 2019, Kubernetes, the world's hottest container orchestration system, discovered the primary major security vulnerability that hit the project's ecosystem. Vulnerability CVE-2018–1002105 allows attackers to compromise clusters via…
Beyond the Top 10: Finding Business Logic Flaws, Data Leakage and Hard-Coded Secrets in Development The focus of many application security programs has long been the OWASP Top 10 or SANS Top 25 vulnerabilities. While there are many SAST solutions…
IT giant Microsoft revealed the Q2 of 2020 financial results, reporting an optimum revenue of $36.9 billion and a net income of $11.6 total billion. The revenue earned from Windows licenses also increased just when the support of Windows 7 ended.