Programming Languages

The Most In-Demand Programming Languages of 2018

We saw several new programming languages like Kotlin, Rust, and Go lang come into promienence this year. In this article, we take a look at what 2018 has in store when it comes to programming languages ... Read More
Cyber Wars

Cyber Wars in 2018

This year we saw a number cyber attacks like WannaCry and Petya aimed at causing disruptions and damage to organizations and nations. In this article, we take a look at what is in store for us in 2018 ... Read More
Ransomware

Is the World Ready for the New Generation of Self-Propagating Ransomware?

|
Self-propagating threats such as WannaCry and Petya were only the tips of the iceberg. The success hackers enjoyed with WannaCry and Petya makes it quite likely others will try to replicate the tactics used by deploying ransomware as a worm. The propagation mechanisms employed by both ransomware families enabled the ... Read More
Application Performance Management

The Impact of DevOps on Application Performance Management

|
Application Performance Mangement or APM refers to the practice of monitoring the performance of your code, application, runtimes, and overall user experience. In this article, we will talk about how DevOps impacts APM and how you can adjust to the new software supply chain ... Read More
Information Security

What are the top 3 free security tools that every infosec professional should use?

|
There are several free tools that a security engineer may use as part of their arsenal but the following three are quite essential ... Read More
Open Source Word Cloud

Companies Lax on Open Source Risk

|
Recently, a survey done on open source risk found that enterprises are not proactive in managing and securing the use open source. Almost 40% of respondants said that no one in their company was responsible for open source compliance. Use of insecure components and vulnerable open source libraries is on ... Read More
General Data Protection Regulation

5 Steps Towards GDPR Compliance

|
On 25th May 2018 the EU General Data Protection Regulation (GDPR) will become enforceable. It will change how businesses and public sector organizations can handle information of customers and users. GDPR is Europe’s new framework for data protection laws and replaces existing data protection directive. The full text of the ... Read More
Spring Boot sample pet clinic application

Protecting Spring Boot Apps with Botwall4J

|
Botwall4J is an open-source library that can help protect Java web applications from bots, content scrapers and automated account hijacking attempts. In this article, we will see how simple it is to integrate botwall4j with a Spring Boot application and get protection from bots without any code changes ... Read More
Partial grammar for URLs

Continuous fuzzing of Java projects with GramTest

|
GramTest is a Java-based tool that allows you to generate random test cases based on BNF grammars. It is an open-source project and can be downloaded from GitHub. In this article, we will see how you can use GramTest to generate continuous tests that can in-turn be used to fuzz ... Read More
Security Gadgets

Lambda Security is up and running!

|
I have always been interested in the interplay between programming languages and software security. In particular, isn’t it nice that there are class of vulnerabilities that can be eliminated by designing a different programming language? For example, consider buffer overflow, it is one of the most common defects in C ... Read More