Alex SmolenBetter security policiesSecurity policies are the backbone of information security programs. They define commitments to leadership and communicate objectives to…1d ago
Tiexin Guoin4th CoffeeContainer Security Scanning: Vulnerabilities, Risks and ToolingContainer vulnerabilities and container security scanning: tools, SCA, runtime security, and more.Jul 262
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…Jul 20106Jul 20106
The Useful TechinMac O’ClockWhy Apple’s Private Cloud Is The Best AI Implementation YetApple’s Is Going To Permanently Change Our Perception About AIJun 308Jun 308
Alex SmolenBetter security policiesSecurity policies are the backbone of information security programs. They define commitments to leadership and communicate objectives to…1d ago
Tiexin Guoin4th CoffeeContainer Security Scanning: Vulnerabilities, Risks and ToolingContainer vulnerabilities and container security scanning: tools, SCA, runtime security, and more.Jul 262
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…Jul 20106
The Useful TechinMac O’ClockWhy Apple’s Private Cloud Is The Best AI Implementation YetApple’s Is Going To Permanently Change Our Perception About AIJun 308
Andrew BloomanStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.4d ago
Paras BansalImplementing SSL/TLS in Springboot — Standard TLS part-1This is part-1 of a two part series where I show how to implement SSL/TLS in springboot using self-signed certificates. This post covers…4h ago
Mike HearningraalvmWriting Truly Memory Safe JIT CompilersHow to kill off a top source of browser exploitsJun 63