Python PyPi Repository Vulnerabilities Discovered
The Python Package Index – also known as the PyPi repository – is host to thousands of helpful libraries that enhance Python’s already powerful core. Recently, however, a vulnerability was found by the...
View ArticleOverview of AI-based Cybersecurity Technologies
In the new era of Artificial Intelligence (AI), the game of cat and mouse in the realm of cybersecurity has reached its head. AI, from its side, gives cybersecurity added power for more intelligent...
View ArticleZero Trust Security Architecture Overview
If your tightly secured network has ever been hacked by a falsely authorized user, then you may benefit from learning about the Zero Trust architecture security model. While the term “Zero Trust” might...
View ArticleOverview of IoT Security Challenges
Are you eagerly waiting to enter the era of smart homes and self-driving cars? There has been a lot of buzz around the Internet of Things (IoT) and connectivity over the past few years, as more and...
View ArticleSecuring Web APIs
Web APIs are tools that simplify the coding process and enable developers to access the information from outside sources into the application they build. An example of a web API is a travel service...
View ArticleHow to Manage Linux Users From the Terminal
Linux is a multi-user Operating System (OS). This means that multiple users can use the same Linux system at the same time. As a system administrator or sysadmin, you need to be able to control who has...
View ArticleSecurity Challenges and Solutions for Microservices Architecture
Over the past few years, technologies like cloud computing and microservices emerged to meet the increasing demands of scalability, resilience, and availability. Microservices architecture has been an...
View ArticleTraditional Security vs. Cloud Security Overview
Cloud computing is increasingly becoming more popular. By comparison, traditional on-premises computing is already widespread with features that span from cost to management ease to, one of the most...
View ArticleHermeticWiper and WhisperGate
On February 26, 2022, the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Advisory together with the Federal Bureau of Investigation. CISA is the nation’s leader in...
View ArticleUsing awk to Analyze Log Files
Every Linux sysadmin knows that log files are a fact of life. Every time there is a problem, log files are the first place to go to diagnose nearly every kind of possible problem. And, joking aside,...
View Article