What do you do when your car breaks down? A major home repair is needed? What if you have a...
Security & Compliance Blog
Callback Hell
Callback Hell, also known as Pyramid of Doom, is an anti-pattern seen in code of asynchronous...
Digital Forensics and Incident Response (DFIR): An Introduction
Digital forensics and incident response is an important part of business and law enforcement...
The Windows Curveball Vulnerability and What You Can Do About It
What is Curveball? I like to watch baseball, and am amazed at pitchers who can throw a good...
Introduction to Information Security Management Systems (ISMS)
Every technology-driven business process is exposed to security and privacy threats. Sophisticated...
Top 22 IT Security, InfoSec & CyberSecurity Conferences of...
Conferences are an important part of any industry, and they are especially crucial in the quickly...
Too Many Vulnerabilities and Too Little Time? Why Automation is...
Too Many Vulnerabilities and Too Little Time? Why Automation is an Imperative For today’s security...
SecOps in Action, and how you can benefit from it
In my previous post “What is SecOps and how can you maximize its potential?”, I defined SecOps as...