New Docker-based Dev Pipeline: Microservice Projects Just Got A ‘Speed-Boost’
A bulwark of software engineering projects, the development pipeline is an automated process used to deliver changes from development through to production; enabling near...
The Base of Cyber-Attacks: Credential Harvesting
Cyber attackers long ago figured out that the easiest way to gain access to sensitive data is by compromising an end user’s identity and...
The Dos and Don’ts of DevOps
The Dos and Don'ts of DevOps #outlook a{ padding:0; } body{ width:100%...
Spam and phishing in Q3 2018
Quarterly highlights
Personal data in spam
We have often said that personal data is candy on a stick to fraudsters and must be kept safe (that...
Hey there! How much are you worth?
Have you ever stopped to think just how much your life is worth? I mean really think about it. For instance, let’s say you...
Real-Time File Integrity Monitoring
Tripwire, Inc.
DDoS Attacks in Q3 2018
News Overview
The third quarter 2018 turned out relatively quiet in terms of DDoS attacks. “Relatively” because there were not very many high-level multi-day DDoS...
How would you choose an Industrial Cybersecurity Framework?
How would you choose an Industrial Cybersecurity Framework? #outlook a{ padding:0; }...
Hackers attacking your memories: science fiction or future threat?
Authors: Kaspersky Lab and the Oxford University Functional Neurosurgery Group
There is an episode in the dystopian near-future series Black Mirror about an implanted chip...












