AWS v/s Google v/s Azure: Who will win the Cloud War?

In the midst of this pandemic, what is allowing us unprecedented flexibility in making faster technological advancements is the availability of various competent cloud computing systems.

3 Biggest Mistakes Board Can Make Around Cyber Security

Overall, although the topic of cyber security is now definitely on the board’s agenda in most organisations, it is rarely a fixed item. More often than not, it makes appearances at the request of the Audit & Risk Committee or after a question from a non-executive director, or – worse – in response to a security incident or a near-miss.

Detecting Credentials In Source Code: Solutions Guide

Detecting Credentials In Source Code: Solutions Guide. Commercial secrets detection solutions — Building a custom solution in house; Using open-source projects. GitGuardian - GitHub Token Scanning - GitLab secrets detection. Tool: Description Radar API lets you integrate with GitHub.

Affordable Kubernetes for Personal Projects

Affordable Kubernetes for Personal Projects Running a Kubernetes cluster doesn't have to be expensive. In this article we discuss how. I'm a great fan of containerization and the Kubernetes (k8s) orchestration system in particular, and I like messing about with personal projects, but I've always found hosting my own projects in a k8s cluster to be prohibitively expensive.

FaaS: Security Considerations to Know Before Going Serverless

FaaS: Security Considerations to Know Before Going Serverless. Serverless architecture is becoming a compelling choice to host applications. What security considerations need to be made before choosing to go serverless?

Cybersecurity & Cyber Resilience: Together, Not One Without the Other | Technical Coder

cyber security, cyber resilience, cyber security vs cyber resilience,cyber security plan,network,computer security,google, cyber, security, resilience

10 Cyber Security Tools to Watch Out for in 2021 - DZone Security

In this article, take a look at ten cyber security tools to watch out for in 2021, including NMap, Wireshark, Metasploit, and more!

AI In Cyber Security: A Necessity Or Too Early To Introduce?

AI in cyber security, while not a silver bullet, can help improve an organisation's overall cyber security posture — if they get the security basics right in the first place (firewalls, data encryption etcetera). With any technology, there is no such thing as a silver bullet.

Account Takeover Fraud Losses Total Billions Across Online Retailers

Account takeover (ATO) attacks are on the rise, and in fact have become a go-to attack of choice cybercriminals of all stripes. In fact, in 2019 alone, ATO attacks cost consumers and e-commerce retailers a whopping $16.9 billion in losses.

5 Cyber Security Risks Every Freelancer Must Avoid While Working With Foreign Clients

This article outlines five of the top cybersecurity risks that development freelancers should be wary of with foreign clientele.

Security Think Tank: Security at the distributed edge

That datacentre security is a complex subject is not in doubt, and given the trend to move beyond centralised datacentres to distributed environments, this is not going to change. How can security professionals ensure such setups are just as secure as the traditional centralised model?

What Role Should Social Media Play in Discovering Vulnerabilities?

Social media often plays a larger part in exposing vulnerabilities in open source software than official media. Is that for the best? New research from the Pacific Northwest National Laboratory (PNNL) Data Sciences and Analytics Group shows that 25% of vulnerabilities appear on social media before the National Vulnerability Database (NVD).

Cyber Security: Beyond a Mere Operational Approach

Something which is below them and is dealt with somewhere below them in the organisation. It is the type of mental attitude which is has led to twenty years of maturity stagnation in real terms across the security industry, in spite of the billions spent with tech vendors.

Machine Learning Vs. Cybercrime: 4 Ways ML is Fighting Back

Machine Learning Vs. Cybercrime: 4 Ways ML is Fighting Back. AI and ML are powerful forces in disrupting cybercrime, protecting enterprises, and safeguarding against data breaches.

“Good Security Governance” is not a Piece of Useless Consultant Jargon

“Good Security Governance” is not a Piece of Useless Consultant Jargon. It is an essential protective layer for any organisation. Irrespective of what many of us may say or write, the.

Mobile Apps and Data Security: What Developers Ought to Learn

Mobile Apps and Data Security: What Developers Ought to Learn. In the past few years, mobile app development technology is gaining much popularity. To fulfill the demands of customers.

Does the role of the “Virtual CISO“ make any sense?

Outsourcing something simply because you don’t understand it is rarely a good start. Faced by constant reports of cyber-attacks in

Cyber Security and COVID-19: How Has the Pandemic Affected the IT Industry?

The COVID-19 pandemic has impacted the entire world in a variety of different ways. Every person has been impacted one

Can you still Afford “not to afford” Cyber Security?

COVID-19 changes the game: Now is not the time to risk a cyber-attack. Earlier ransomware incidents that have affected  organisations

What is Adaptive Security? Adaptive Security Architecture

Overview of What is Adaptive Security, Understanding How to Adopt Security for Enterprise and Why Cybersecurity Needs to be Adaptive?