Tag: Infosec
-
8 essential Android 15 security features you should set up immediately
Posted on October 1, 2024, Level beginner Resource Length medium
Google has released Android 15, which includes several significant security enhancements. These updates focus on privacy and theft protection, such as Private space, which allows users to create a separate, secure area on their device for sensitive data and apps1. Additionally, theft protection features include automatic device locking if theft is detected and preventing factory resets without authentication. By Parth Shah.
Tags android learning app-development infosec google
-
Serverless use cases: How enterprises are using the technology to let developers innovate
Posted on September 7, 2024, Level beginner Resource Length medium
Serverless, or serverless computing, is an approach to software development that empowers developers to build and run application code without having to worry about maintenance tasks like installing software updates, security, monitoring and more. With the rise of cloud computing, serverless has become a popular tool for organizations looking to give developers more time to write and deploy code. By Mesh Flinders.
Tags infosec microservices ibm serverless
-
What is AI security?
Posted on August 19, 2024, Level beginner Resource Length medium
Short for artificial intelligence (AI) security, AI security is the process of using AI to enhance an organization's security posture. With AI systems, organizations can automate threat detection, prevention and remediation to better combat cyberattacks and data breaches. By Annie Badman, Matthew Kosinski.
Tags infosec ai ibm cloud software-architecture cio
-
Identity threat detection and response solution guide
Posted on August 15, 2024, Level intermediate Resource Length medium
Identity Threat Detection and Response (ITDR) has emerged as a critical component to effectively detect and respond to identity-based attacks. Threat actors have shown their ability to compromise the identity infrastructure and move laterally into IaaS, Saas, PaaS and CI/CD environments. Identity Threat Detection and Response solutions help organizations better detect suspicious or malicious activity in their environment. By The Hacker News.
Tags infosec devops cloud software-architecture learning cio
-
Why (and how) APIs and web applications are under siege
Posted on August 8, 2024, Level intermediate Resource Length medium
Attackers are increasingly targeting web applications and APIs, with a nearly 50% year-over-year growth in web attacks, driven by the increased adoption of these technologies, which significantly expanded organizational attack surfaces, according to an Akamai report. By Mitch Mayne.
Tags infosec devops apis restful
-
The ultimate guide to incognito browsing: Tips and tricks for secure online surfing
Posted on July 24, 2024, Level beginner Resource Length medium
Switching to incognito mode, also known as private browsing or privacy mode, is like going undercover on the internet. Most web browsers offer this feature so that things like your browsing history, cookies, or site data aren't kept on your computer when you're online. By Tom Siani.
Tags browsers how-to infosec
-
12 secure browsers that protect your privacy in 2024
Posted on July 16, 2024, Level beginner Resource Length long
A secure browser that protects your privacy is a critical tool for staying safe online and keeping your data secure from third parties. We have been reviewing, testing, and ranking browsers for the past six years and this guide contains the latest recommendations for 2024. By Alex Lekander.
Tags browsers how-to infosec teams miscellaneous
-
Qualcomm: Generative AI and impressive diversification signal a new era of growth
Posted on June 22, 2024, Level beginner Resource Length short
QCOM's entry into the AI chips market seems promising, with MSFT endorsing the ARM-based Snapdragon X Elite CPU chips as the "fastest, most AI-ready PC ever built." By Juxtaposed Ideas.
Tags infosec management ai cio machine-learning
-
To end burnout, cybersecurity must tolerate failure
Posted on June 15, 2024, Level beginner Resource Length medium
At Gartner Security and Management Summit, speakers explained that you can't buy your way out of cybersecurity burnout. They discussed how a shift from a protection-focused program to a response-focused security strategy can help. By Ijeoma S. Nwatu.
Tags infosec management web-development cio
-
How to kill a process in Linux: Commands and best practices
Posted on May 29, 2024, Level beginner Resource Length short
There are multiple situations where it is necessary to terminate a Linux process – for example, when the program does not respond or freezes. Learning how to kill a process properly is a vital skill that can help keep your various systems healthy and functioning optimally. By Jeff Smith.
Tags linux app-development infosec web-development servers
-
Web scraping with PHP: Step-by-step tutorial
Posted on May 17, 2024, Level beginner Resource Length medium
In this article, you'll learn to build a PHP web scraper, from the basics to more advanced techniques. By zenrows.com.
Tags php app-development infosec web-development
-
Securing Kafka communication channels on Kubernetes with TLS/mTLS
Posted on May 1, 2024, Level intermediate Resource Length medium
The article covers a guide on setting up TLS/Mutual TLS (mTLS) for securing communication between Kafka clients and servers, specifically in a Kubernetes environment, thus mitigating potential threats such as man-in-the-middle attacks and unauthorized access to data. We'll be starting off by diving into a bunch of topics that'll help you understand why we're doing what we're doing for our setup. By Aranya Chauhan.
Tags devops app-development infosec kubernetes ssl