Recent database offerings by AWS — Good for users, Dangerous for open source business models
Recent database offerings by AWS — Good for users, Dangerous for open source business models by Ashan Fernando Amazon Web Services (AWS) is …
Read MoreData Provenance - Unintended Consequences of Multiple Data Breaches
Data Provenance - Unintended Consequences of Multiple Data Breaches by Michael Queralt The results of the multiple data breaches and …
Read MoreWill DDOS Attack Break the Servers…?
Will DDOS Attack Break the Servers…? Distributed Denial of Service in a Nutshell. by Vamsi Thanjagari Understanding DDoS Attack Distributed Denial …
Read MoreHotel Data Security — PCI Compliance and PII Security Explained
Hotel Data Security — PCI Compliance and PII Security Explained by Mohammad Ziaee The integration of technology in hotels is quickly becoming …
Read MoreJulia: a Language for the Future of Cybersecurity
Julia: a Language for the Future of Cybersecurity by Shen Huang Julia 1.0 was released in 2018. It is a …
Read MoreUkraine under CyberAttack
Ukraine under CyberAttack by Maxim Virshubsky New cyber attack on the business of Ukraine. Full analysis of the latest version …
Read MoreThe Things Women Do
The Things Women Do by Eliza May Austin In 2017, after a “small” glass of Rioja, I penned the article …
Read MoreAn Analyst's Review of Top Cyber Certs
First we'll do a quick review of each test. The tests are ordered based on their level, which is based …
Read MoreThree Actionable Steps To Take Following Your Penetration Testing
There’s a saying, if you keep doing what you’ve always done, you’ll keep getting what you’ve always gotten. The growing …
Read MoreRemote Code Execution Vulnerability in the Austrian Electronic Banking Application ELBA5
by Florian Bogner The case was originally published at: https://bogner.sh/2018/11/0-day-in-elba5s-network-installation-overtaking-your-companys-bank-account/ This blog post is about a previously unknown critical vulnerability in …
Read More