Ethical hacking for the greater good – what’s it worth and why is it done? We delve into the details to uncover what it is about bounty hacking that attracts the most talented and committed white hats around.
A website is the key to your business ROI, to the success of your brand and to the happiness of your customer. Just like a traditional brick-and-mortar business needs to be stocked, friendly and clean, so also your website needs to run as fast and efficiently as possible.
Whether developers like it or not, DevOps is here to stay. At the DevOpsCon in Berlin, we spoke to DevOps consultant Andreas Schmidt about why the initial hurdles are worth the switch to a DevOps approach.
Current approaches to application security are failing to provide adequate protection, says Waratek CEO Brian Maccaba.
Security is still the biggest concern for e-commerce enterprises pondering cloud expansion. There are three things an e-commerce IT team should consider when deciding on their cloud solution, says Rackspace’s cloud computing pro Marco Schmid.
The quick-trick type of DDoS attack is becoming more commonplace and is being used to disrupt traffic and negatively affect businesses. Most websites aren’t prepared to meet the threat that tests their vulnerability and reaction time.
Oracle’s announces last critical patch update for Java 7, while exposing a number of remotely executable security threats for Java applications.
Following today’s funding announcement for stealth security analytics firm Niara, CEO Sriram Ramachandran told us that cyber attacks are now more sophisticated than ever.
GitHub is currently involved in a massive denial of service attack, with the barrage now moving past the 24 hour mark. The attack is being administered by Chinese internet giant Baidu.
The annual Pwn2Own fest has given software developers a decent headache, thanks to newfangled bugs discovered in Adobe Flash and Reader, Microsoft’s Windows and IE, and Mozilla’s Firefox.
Michael Nygard’s Circuit Breaker Pattern has been adopted by Netflix and been established as a central part of Resilient Software Design. Its acclaimed author explains the benefits of Resilient Software Design and why it matters exactly how we fail.
Tails 1.3, the Amnesic Incognito Live System famously used by Edward Snowden, has just been released and introduces the Electrum Bitcoin Wallet, on top of addressing numerous security concerns.
With new technologies come new security risks. IoT Conference speaker Paul Fremantle looks at the challenges of IoT security.
In the wake of the MongoDB insecurity debacle, Lukas Eder writes that the solution is a wider variety of skills in a developer team.