Defense and Security
83 Blog Posts
47 Contributors
-
Greetings, I am glad to inform you about a significant development in the RedRays Security Platform for the ABAP stack. We have created a new module that effectively deals with the pressing concern of password security in today’s digital... Read More »0Comments2Likes
-
Introduction The P4 protocol is important in Java remote communication, mainly with Java Naming and Directory Interface (JNDI) and Java Remote Method Invocation (RMI). It helps Java applications talk to remote objects across Java Virtual Machines... Read More »0Comments0Likes
-
On March 2, the White House announced a National Cybersecurity Strategy that seeks to establish “deep and enduring collaboration among stakeholders” as the foundation of securing the digital ecosystem. On Episode 13 of The Trust Corner podcast,... Read More »0Comments1Like
-
I would like to briefly introduce the Threat Modeling methodology in this blog post. This will be the initial part of the PASTA methodology, while the subsequent part will feature an example of Threat Modeling for the SAP Landscape (for on-premises... Read More »0Comments1Like
-
SAP is proud to announce its partnership with the Joint Cyber Defense Collaborative (JCDC) SAP believes strongly in the power of collective action, especially when it comes to the security of our people, products, assets and our hundreds of... Read More »0Comments2Likes
-
The days of gigantic, monolithic programs are archaic; frankly, the complexity of a single-program approach is overwhelming. A modular approach to architecture is, therefore, the clear winner and a logical choice. Modular systems support a work... Read More »0Comments5Likes
-
The U.S. Department of Labor (DOL) national industry intermediary, Safal Partners, announced In November 2022, that it has contributed to shrinking the nation’s critical cybersecurity workforce gap by bringing more than 1,000 new apprentices... Read More »0Comments5Likes
-
Introduction Defense organizations must protect their information from both external and internal security threats. To protect from external threats, Cyber Security best practices are applied on network, servers, and workstations. This includes... Read More »0Comments10Likes
-
It will never happen to me ! When I started writing this blog article, before typing any single word, I searched on Google for “GitHub hardcoded credential data leak”, and the very first result was a very recent news from yesterday:... Read More »0Comments10Likes
-
Techno-Fogeys Episode 3 We hear many things about the #Metaverse, a world where virtual things, digital humans, cryptocurrencies and the creator economy will thrive. With Roblox having 202 active monthly users and seeing 40% growth year on year,... Read More »0Comments0Likes