Category: EN

QR Codes are a Security Blindspot

By Mary Blackowiak, Director of Product Management and Development, AT&T Business Whether at the grocery store, eating dinner at a restaurant, locating a gate at the airport, gaining entry to an event, or even watching TV—QR codes are popping up…

Cisco Releases Security Advisories for Multiple Products

Cisco released security advisories for vulnerabilities affecting multiple Cisco products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following advisories and apply the…

6 Steps to Accelerate Cybersecurity Incident Response

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must […] The post 6 Steps to Accelerate Cybersecurity Incident Response…

18 Software Development Trends and Predictions 2024

The need for thorough risk assessments, continuous testing, and compliance checks before full-scale deployments is unavoidable. The future of software development demands businesses to be gearing up for a delicate dance between innovation and reliability. This year, we saw enthusiasm…

Top 5 Kubernetes Vulnerabilities – 2023

Kubernetes is a popular open-source platform for managing containerized workloads and services. It’s a system that simplifies a wide array of deployment, scaling, and operations tasks, but it’s not without its risks. Just as any other software or platform, Kubernetes…