Syndicated Blog

Lambda%20Security
Thoughts on software engineering and computer security
Examples showing the meraGPT models

Sparks of Digital Immortality with meraGPT

|
In an era where our digital footprints are as expansive as the internet itself, the concept of digital immortality is not just science fiction but a burgeoning reality. The introduction of meraGPT, ...
an illustration showing clean design representing static code analysis

AutoFix: Automated Vulnerability Remediation using Static Analysis and LLMs

|
In the rapidly evolving world of software development, security remains a paramount concern. With the increasing complexity of applications and the ever-present threat of cyber attacks, developers and security teams are in ...
Overview of SCA for DevOps

When the going gets tough: Understanding the challenges with Product commoditization in SCA

|
Recently, I have been thinking a lot about product commoditization and how it affects the software composition analysis (SCA) tools market. If you have been living under a rock and have never ...
Programming Languages

The Most In-Demand Programming Languages of 2018

|
We saw several new programming languages like Kotlin, Rust, and Go lang come into promienence this year. In this article, we take a look at what 2018 has in store when it ...
Cyber Wars

Cyber Wars in 2018

|
This year we saw a number cyber attacks like WannaCry and Petya aimed at causing disruptions and damage to organizations and nations. In this article, we take a look at what is ...
Ransomware

Is the World Ready for the New Generation of Self-Propagating Ransomware?

|
Self-propagating threats such as WannaCry and Petya were only the tips of the iceberg. The success hackers enjoyed with WannaCry and Petya makes it quite likely others will try to replicate the ...
Application Performance Management

The Impact of DevOps on Application Performance Management

|
Application Performance Mangement or APM refers to the practice of monitoring the performance of your code, application, runtimes, and overall user experience. In this article, we will talk about how DevOps impacts ...
Open Source Word Cloud

Companies Lax on Open Source Risk

|
Recently, a survey done on open source risk found that enterprises are not proactive in managing and securing the use open source. Almost 40% of respondants said that no one in their ...
General Data Protection Regulation

5 Steps Towards GDPR Compliance

|
On 25th May 2018 the EU General Data Protection Regulation (GDPR) will become enforceable. It will change how businesses and public sector organizations can handle information of customers and users. GDPR is ...
Spring Boot sample pet clinic application

Protecting Spring Boot Apps with Botwall4J

|
Botwall4J is an open-source library that can help protect Java web applications from bots, content scrapers and automated account hijacking attempts. In this article, we will see how simple it is to ...