Quantcast
Channel: Security Archives | Developer.com
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Python PyPi Repository Vulnerabilities Discovered

The Python Package Index – also known as the PyPi repository – is host to thousands of helpful libraries that enhance Python’s already powerful core. Recently, however, a vulnerability was found by the...

View Article


Image may be NSFW.
Clik here to view.

Overview of AI-based Cybersecurity Technologies

In the new era of Artificial Intelligence (AI), the game of cat and mouse in the realm of cybersecurity has reached its head. AI, from its side, gives cybersecurity added power for more intelligent...

View Article


Image may be NSFW.
Clik here to view.

Zero Trust Security Architecture Overview

If your tightly secured network has ever been hacked by a falsely authorized user, then you may benefit from learning about the Zero Trust architecture security model. While the term “Zero Trust” might...

View Article

Image may be NSFW.
Clik here to view.

Overview of IoT Security Challenges

Are you eagerly waiting to enter the era of smart homes and self-driving cars? There has been a lot of buzz around the Internet of Things (IoT) and connectivity over the past few years, as more and...

View Article

Image may be NSFW.
Clik here to view.

Securing Web APIs

Web APIs are tools that simplify the coding process and enable developers to access the information from outside sources into the application they build. An example of a web API is a travel service...

View Article


Image may be NSFW.
Clik here to view.

How to Manage Linux Users From the Terminal

Linux is a multi-user Operating System (OS). This means that multiple users can use the same Linux system at the same time. As a system administrator or sysadmin, you need to be able to control who has...

View Article

Image may be NSFW.
Clik here to view.

Security Challenges and Solutions for Microservices Architecture

Over the past few years, technologies like cloud computing and microservices emerged to meet the increasing demands of scalability, resilience, and availability. Microservices architecture has been an...

View Article

Image may be NSFW.
Clik here to view.

Traditional Security vs. Cloud Security Overview

Cloud computing is increasingly becoming more popular. By comparison, traditional on-premises computing is already widespread with features that span from cost to management ease to, one of the most...

View Article


Image may be NSFW.
Clik here to view.

HermeticWiper and WhisperGate

On February 26, 2022, the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Advisory together with the Federal Bureau of Investigation. CISA is the nation’s leader in...

View Article


Image may be NSFW.
Clik here to view.

Using awk to Analyze Log Files

Every Linux sysadmin knows that log files are a fact of life. Every time there is a problem, log files are the first place to go to diagnose nearly every kind of possible problem. And, joking aside,...

View Article
Browsing all 10 articles
Browse latest View live