5 high-profile DDoS attacks that should chill you to the bone
Distributed denial of service (DDoS) attacks are malicious attempts to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server. Data revealed in ...
How to Scale While Avoiding CI Pitfalls
Moving quickly while also maintaining high quality and availability is a balancing act that is hard to maintain but essential to the success of any software development lifecycle. Many teams today are ...
Q&A With Andrew Gardner | Avast
Andrew Gardner, Ph.D., has collected comic books since he was a kid. Back then, his favorite character was Iron Man because — unlike other superheroes — Iron Man created his special abilities: ...
API Security: Teamwork makes the dreamwork
This is the third and final article in a series that looks at application security in the API-first era. These articles summarize a 3-part webinar focusing on the adjustments that leading global ...
Wanted: Disgruntled Employees to Deploy Ransomware
Criminal hackers will try almost anything to get inside a profitable enterprise and secure a million-dollar payday from a ransomware infection. Apparently now that includes emailing employees directly and asking them to ...
Deepfakes and its important implications from cyber perspective
Deepfakes and its important implications on all of us from cyber perspective Author: Nyan Tun Zaw, VP, Athena Dynamics Advisory Editor: Ken Soh, CEO, Athena Dynamics Copyright © July 2021 All Rights ...
Why so Much Resistance to MFA?
I was speaking with a doctor friend the other day. We were chatting about electronic medical records and how her office secured the patient information. She told me about all of the ...
APAC’s vulnerability to cyber attacks
As the most targeted region in the world by ransomware and state-sponsored advanced persistent threat (APT) groups, the Asia Pacific region (APAC) experienced a 168% increase in cyberattacks between May 2020 to ...
5 Steps to improving your Secure Scorecard
Improve the security of your software development pipeline by following these five simple stepsPhoto by Markus Winkler on UnsplashThe Secure Scorecard project, established by the Open Source Security Foundation (OpenSSF), sets out a series ...
Malicious Life Podcast: The Jester – Hacktivist for Good
The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that ...