Please turn on your JavaScript for this page to function normally.
cloud
Cloud computing could prevent the emission of 1 billion metric tons of CO2

Continued adoption of cloud computing could prevent the emission of more than 1 billion metric tons of carbon dioxide (CO2) from 2021 through 2024, a forecast from IDC shows. …

circle
The influence of the Agile Manifesto, 20 years on

On 11th February 2001, many software delivery thought leaders came together in Snowbird, Utah, to discuss how to create processes that can enable enterprises to continuously …

architecture
Why enterprises need rugged devices with integrated endpoint management systems

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …

Kali Linux 2021.1
Kali Linux 2021.1 released: Tweaked DEs and terminals, new tools, Kali ARM for Apple Silicon Macs

Offensive Security has released Kali Linux 2021.1, the latest version of its popular open source penetration testing platform. You can download it or upgrade to it. Kali Linux …

PCI
PCI SSC releases PCI Secure Software Lifecycle (SLC) Standard 1.1

The PCI Security Standards Council (PCI SSC) has published version 1.1 of the PCI Secure Software Lifecycle (SLC) Standard and its supporting program documentation. The PCI …

broken
Accellion to retire enterprise file-sharing product targeted in recent attacks

U.S.-based cloud solutions company Accellion will soon retire FTA, its legacy enterprise file-sharing solution, vulnerabilities in which have recently been exploited by …

IPCDump
IPCDump: Open-source tool for tracing interprocess communication on Linux

Guardicore released IPCDump, a new open source tool for tracing interprocess communication on Linux. The tool covers most interprocess communication (IPC) mechanisms, …

bomb
When it comes to vulnerability triage, ditch CVSS and prioritize exploitability

When it comes to software security, one of the biggest challenges facing developers today is information overload. Thanks in part to the widespread proliferation and use of …

BluBracket Community Edition
BluBracket Community Edition: Detect and monitor secrets in code for free

BluBracket announced its Community Edition, a free, robust and automated tool for finding passwords, tokens and other security vulnerabilities in code. It uses a novel, …

USB-Lock-RP
Product showcase: USB-Lock-RP

USB ports in any organization’s network need to be controlled because connected devices such as USB drives and smartphones can be used to transfer malware to computers …

Microsoft Azure
Open-source tool BlobHunter helps pinpoint public Azure blobs that might contain sensitive files

CyberArk researchers have released BlobHunter, an open-source tool organizations can use to discover Azure blobs containing sensitive files they have inadvertently made …

data
Data loss prevention strategies for long-term remote teams

Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv …

Don't miss

Cybersecurity news