Search results: game development

2021 Post-Mortem and 2022 Year of Resilience

2021 Post-Mortem and 2022 Year of Resilience

| | Informative
Once upon a time, I proclaimed I had the solution to the problem. A wise man then responded by asking, “What are the trade-offs?” As the year draws to a close, we ...

2021 in Review, Part 1: 5 Cybersecurity Topics that Made News

It’s been another chaotic year in cybersecurity, as protecting web applications and stopping sensitive data breaches remain top-of-mind issues and continue to generate headline news. As 2021 comes to a close, cybersecurity ...

Cybersecurity: When Stress and Trauma ‘Get in the Way’

This blog contains a discussion about stress, trauma, and domestic violence. This may be difficult for some readers, and given the alarming figures around Post-Traumatic Stress Disorder (PTSD), trauma, and early life ...
Log4Shell — Preparing for What Comes Next

Log4Shell — Preparing for What Comes Next

We’re now at about the two week point after news of the vulnerability in the Apache Foundation’s Log4j logging tool for Java, dubbed Log4Shell, splashed into the headlines.  The post Log4Shell — ...
LOG4J vulnerability the most serious I've seen in my decades-long career: CISA director

The Security and Business Impact of Log4J

| | Axio Insights
You don’t need to be embedded in the tech world to have seen these apocalyptic headlines flooding your screens within the last few weeks. A major vulnerability to cybersecurity across the internet was revealed in the widely used, open-source Java-based data logging ...
LOG4J vulnerability the most serious I've seen in my decades-long career: CISA director

The Security and Business Impact of Log4J

You don’t need to be embedded in the tech world to have seen these apocalyptic headlines flooding your screens within the last few weeks. A major vulnerability to cybersecurity across the internet was revealed in the widely used, open-source Java-based data logging ...
Relay races, batons, and techniques: How to improve your cloud security posture

Relay races, batons, and techniques: How to improve your cloud security posture

In 2008, the US 4x100m relay team was the favorite to win the gold medal at the Beijing Olympics. Not a massive surprise, considering that team included the second fastest athlete in ...

Hackers gonna hack: The importance of web security

| | Blog
There is no getting around it. Your website has vulnerabilities and, yes, it can be hacked. If someone hasn’t already breached your website, chances are pretty darn good that they will sometime ...
Five fundamental tips for getting executive buy-in on AppSec

Five fundamental tips for getting executive buy-in on AppSec

| | Web Security Zone
The need for effective cybersecurity programs has never been more apparent. By October of 2021, the number of data breaches leapfrogged the total from 2020 by 17%, and 2021 saw the highest ...

Log4j vulnerability: Lessons learned in a week

Introduction In this blog post, Praetorian reflects on customer challenges, successes, and lessons learned from our response to the Log4j industry-wide response. Background On the Friday evening of December 10th, Praetorian research ...