Coding since web pages were built using vi and C compilers used dual floppy drives.
Does Cloud Computing seem like full circle back to a mainframe with a mouse?
Far too long! What about private companies and Government? The public has a right to know immediately. thehackernews.com/2023/07/new-...
Far too long! What about private companies and Government? The public has a right to know immediately. thehackernews.com/2023/07/new-...
wp.me/peSvjo-k9
wp.me/peSvjo-k9
Anything make one stand out over another? In the middle of evaluating the products, all are excellent, doing evals not an option.
#cybersecurity #zerotrust #microsegmentation
Anything make one stand out over another? In the middle of evaluating the products, all are excellent, doing evals not an option.
#cybersecurity #zerotrust #microsegmentation
Can’t embrace password managers, feel this is the appropriate direction to pursue securing work and personal accounts.
Any issues for accounts with DUO, Google, etc 2FA?
#cybersecurity
Can’t embrace password managers, feel this is the appropriate direction to pursue securing work and personal accounts.
Any issues for accounts with DUO, Google, etc 2FA?
#cybersecurity
Today, emergency patching for CVE-2024-21888 & CVE-2024-21893, the latter coming under active exploitation attributed to UNC5221, a China-nexus espionage threat actor. Patch!
Today, emergency patching for CVE-2024-21888 & CVE-2024-21893, the latter coming under active exploitation attributed to UNC5221, a China-nexus espionage threat actor. Patch!
📦 farhanashrafdev / 90DaysOfCyberSecurity
⭐ 4,015 (+171)
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, ...
📦 farhanashrafdev / 90DaysOfCyberSecurity
⭐ 4,015 (+171)
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, ...
Snowden’s leaks should have opened everyone’s eyes to the data mining possibilities.
Scary thing: no spyware needs to be installed for data to be collected. @404media.co
Snowden’s leaks should have opened everyone’s eyes to the data mining possibilities.
(With my Pop and Uncle Art, then to the local pub for lunch! Been a minute…)
(With my Pop and Uncle Art, then to the local pub for lunch! Been a minute…)