By lex Taking a Page From Site Reliability Engineering This article seeks to apply SRE principles to security in the form of a Threat Budget.…
BrainBlog for Permit.io by Jason Bloomberg SCRUM MASTER: Our application is almost ready to go live. One more sprint should do it. DEV TEAM: Hooray!…
DZone article by Jason Bloomberg Cloud-native computing extends well past Kubernetes-based infrastructure to roll up many modern best-practice approaches to building, running, and leveraging software…
BrainBlog for Model9 by Jason Bloomberg Ransomware is a pernicious form of malware that encrypts important files on business systems. The attacker then requests a…
Intellyx BrainBlog for Kasten by Veeam, in The New Stack Enterprises that depend upon software innovation and massive scalability for success are inevitably among the…
Slim.AI press release Specifically, Slim.AI recently unveiled two new features—Automated Container Optimization and Multi-Scanner Vulnerability Reports—to help developers stay current with vulnerabilities uncovered by multiple…
An Intellyx Brain Candy Brief ThreatModeler offers threat modeling software for organizations that want to understand and mitigate possible cybersecurity threats as they are designing…
French translation of a SiliconANGLE article by Jason Bloomberg Les professionnels de la cybersécurité ont rempli le Mandalay Bay Convention Center à Las Vegas la…
An Intellyx Brain Candy Brief BLST Security analyzes API traffic to uncover broken business logic that can lead to security vulnerabilities. It then maps the…
An Intellyx Brain Candy Brief nVisium is a professional services organization that offers expertise in cybersecurity. The company provides assessments, remediation, and training for organizations…