1,123 Results for:HTTPS
- Sort by:
Clone a git repository with submodules using init and update example
29 Jan 2021When you clone a git repository, it won’t necessarily bring down the branches and code for the associated submodules. The git submodule init and update command and the --recurse-submodules switch ... Read More
Security's Buoyancy Aid - Keeping Your Head Above Murky Cyber Waters With Swimlane
07 Feb 2022Towards the end of last year, I spoke about a vendor, Swimlane, who appeared to be getting the concept of automation and orchestration absolutely on the money – and in the area where it is most ... Read More
US doubles bounty on Lazarus cyber crime group to $10m
27 Jul 2022US State Department doubles a previously announced reward for information on North Korean cyber criminals, including the notorious Lazarus group Read More
Implement API rate limiting to reduce attack surfaces
28 Feb 2022Rate limiting can help developers prevent APIs from being overwhelmed with requests, thus preventing denial-of-service attacks. Learn how to implement rate limiting here. Read More
VMware Workspace One flaw actively exploited in the wild
14 Apr 2022Multiple threat intelligence providers have detected threat activity related to the VMware Workspace One flaw, including cryptocurrency mining activity. Read More
11 technology acronyms software developers need to know
27 Nov 2022From YAGNI to TAGRI, or POC to MVP, here are 11, popular software technology acronyms that often confuse junior developers new to big software development projects. Read More
How to create Git submodules in GitHub and GitLab by example
30 Apr 2021In this GitHub submodule add example, we demonstrate how to take an independent GitHub repository, add a Git submodule and push back to the GitHub server. Read More
Top three questions about the Log4j vulnerability
17 Jan 2022Singapore’s Ensign Infosecurity answers the top three questions about the impact of the Log4j vulnerability Read More
Using A SASE Platform approach: What Are The Real Cost Benefits?
08 Jun 2022Following on from my previous blog - where I talked about the real costs of going down the DIY/product portfolio integration route, rather than opting for a “here’s one they made earlier” solution ... Read More
Emsisoft releases DeadBolt ransomware decryption tool
31 Jan 2022Emsisoft's DeadBolt ransomware decryption tool fixes broken decryptor keys issued by threat actors, and works only if the victim has paid the ransom and received a key. Read More