DZone Article by Jason English What Is Cyber Protection? Cyber Protection is an IT industry solution category that merges the existing spaces of data protection and…
Article by Jason English, for Tricentis Anyone involved in software delivery will tell you that automation – wherever possible – is an inherently good thing.…
Article for SiliconANGLE by Jason Bloomberg Translating legacy code to a modern language is only part of the answer. Transitioning to cloud-native architectures is the…
Maria Korolov writing for The New Stack When Netflix first pioneered chaos engineering 10 years ago with its Chaos Monkey tools, the prevalent idea was randomly shutting…
SiliconANGLE article by Jason English Dev and ops. Containers and cloud computing. Some things just go great together. We’re on the cusp of another great…
Jason English Article for SiliconANGLE Why are “shift-right” practices of monitoring, testing and remediation of software and system issues starting to appear? Because they’re the…
By Jason English I’ve spent most of my professional life convincing businesses to shift things left — shift-left testing for software, shift-left demand and supply forecasts for…
By Jason Bloomberg Some people believe the mainframe is obsolete – an ancient relic of 1960s computing. For others, it serves an important role as…
By Jason English We can plausibly say the enterprise development market turned the tide on cloud-native development in 2020, as most net-new software and serious…
Chinese translation of Forbes Article by Jason Bloomberg by landyliao奢尚编辑转载 假如你在忧虑网络安全,而且你还不知道什么是不合法加密挖矿(亦称作“cryptojacking”),那么你就需要了解这一项目。Cryptojacking比歹意软件更加遍及,成为了2017年最常见的网络进犯方法。 笔者在2018年3月写了一篇文章,名为“Top Cyberthreat Of 2018: Illicit Cryptomining”(2018年尖端网络要挟事情:不合法挖矿),该文章写道:cryptojacking的界说是进犯者在方针体系中秘密地装置加密钱银挖矿软件。从技能层面来说,这个软件并算不上是歹意软件,它只耗费CPU周期和电力来处理加密钱银买卖,进犯者可以以此赚取佣钱,佣钱一般都是匿名的加密门罗币。 Cryptojacking并不需要进犯者来树立指令和操控,而且受害机器也不过是损耗一些CPU周期(又称机器周期),这就导致Cryptojacking更加遭到黑客的欢迎。Skybox Security在Vulnerability and Threat Trends 2018 Mid-Year Update(2018年中缝隙和要挟趋势更新陈述)中解释道:“假如2017年是歹意软件盛行的时代,那么2018年就好像是加密矿工之年。”“加密挖矿歹意软件一般都可以不被发觉,可以为进犯者一向发明收益。”…


