Search results: game development

5 high-profile DDoS attacks that should chill you to the bone

Distributed denial of service (DDoS) attacks are malicious attempts to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server. Data revealed in ...
Thundra Logo

How to Scale While Avoiding CI Pitfalls

| | CI-CD, testing
Moving quickly while also maintaining high quality and availability is a balancing act that is hard to maintain but essential to the success of any software development lifecycle. Many teams today are ...

Q&A With Andrew Gardner | Avast

| | Avast News
Andrew Gardner, Ph.D., has collected comic books since he was a kid. Back then, his favorite character was Iron Man because — unlike other superheroes — Iron Man created his special abilities: ...
API Security: Teamwork makes the dreamwork

API Security: Teamwork makes the dreamwork

|
This is the third and final article in a series that looks at application security in the API-first era. These articles summarize a 3-part webinar focusing on the adjustments that leading global ...
Wanted: Disgruntled Employees to Deploy Ransomware

Wanted: Disgruntled Employees to Deploy Ransomware

Criminal hackers will try almost anything to get inside a profitable enterprise and secure a million-dollar payday from a ransomware infection. Apparently now that includes emailing employees directly and asking them to ...
김주하 AI 앵커가 전하는 9월 22일 정오 주요뉴스

Deepfakes and its important implications from cyber perspective

| | article
Deepfakes and its important implications on all of us from cyber perspective Author: Nyan Tun Zaw, VP, Athena Dynamics Advisory Editor: Ken Soh, CEO, Athena Dynamics Copyright © July 2021 All Rights ...
phishing Telegram

Why so Much Resistance to MFA?

I was speaking with a doctor friend the other day. We were chatting about electronic medical records and how her office secured the patient information. She told me about all of the ...
Security Boulevard

APAC’s vulnerability to cyber attacks

|
As the most targeted region in the world by ransomware and state-sponsored advanced persistent threat (APT) groups, the Asia Pacific region (APAC) experienced a 168% increase in cyberattacks between May 2020 to ...
5 Steps to improving your Secure Scorecard

5 Steps to improving your Secure Scorecard

Improve the security of your software development pipeline by following these five simple stepsPhoto by Markus Winkler on UnsplashThe Secure Scorecard project, established by the Open Source Security Foundation (OpenSSF), sets out a series ...
Malicious Life Podcast: The Jester - Hacktivist for Good

Malicious Life Podcast: The Jester – Hacktivist for Good

The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that ...

Secure Guardrails