Database-as-a-Service (DBaaS) is quickly gaining in popularity across the tech world. These software platform solutions helps users easily manage their database operations without having to really understand any of the abstractions. This allows developers, DBA's and DevOps engineers to quickly automate their backups, create new SQL and NoSQL clusters, and monitor the … [Read more...] about How DevOps Should Use DBaaS (Database-as-a-Service) To Optimize Their Application Development?
Data security
New Year, New Threats: 4 Cybersecurity Predictions For 2019
The new year has always been an important marker for cybersecurity professionals “ just think back to Y2K and the widespread concern that every piece of technology might stop working at midnight on January 1, 2000. After a tough 2018, marked by extensive spam communication via both email and telephone, tens of thousands of different internet scams, and substantial business … [Read more...] about New Year, New Threats: 4 Cybersecurity Predictions For 2019
How to Improve Blockchain Security
In 2014, Mt. Gox, one of the largest cryptocurrency exchanges (managing approximately 70% of all transactions in Bitcoin) had been the victim of successful hacking attempts for a period of three years, and Mt. Gox's customers lost 750,000 Bitcoins. Bitcoin lost over a third of its value when the full extent of the fraud was revealed. In 2016, Bitfinex, one of the most popular … [Read more...] about How to Improve Blockchain Security
How to Implement a Cyber Kill Chain
We are living in a world where everything is networked together, from online transactions to government infrastructure, and therefore, network protection will no longer be an optional extra. Today, cyber-attack has become an international issue, as high-profile infringements have caused many problems that hacks and various security attacks could harm the global economy. A … [Read more...] about How to Implement a Cyber Kill Chain
Social Engineering Methods Used for Malware Distribution
Social engineering has been one of the most effective ways to spread malicious software lately. Whereas software vulnerabilities tend to be patched sooner or later, things don't appear so promising when it comes to human exploits. For example, Microsoft has rolled out a patch that disables autorun feature for USB thumb drives. Moreover, many antivirus products now prevent the … [Read more...] about Social Engineering Methods Used for Malware Distribution