1,123 Results for:HTTPS

  • Sort by: 

Clone a git repository with submodules using init and update example

By Cameron McKenzie 29 Jan 2021

When you clone a git repository, it won’t necessarily bring down the branches and code for the associated submodules. The git submodule init and update command and the --recurse-submodules switch ... Read More

Security's Buoyancy Aid - Keeping Your Head Above Murky Cyber Waters With Swimlane

By Steve Broadhead 07 Feb 2022

Towards the end of last year, I spoke about a vendor, Swimlane, who appeared to be getting the concept of automation and orchestration absolutely on the money – and in the area where it is most ... Read More

US doubles bounty on Lazarus cyber crime group to $10m

By Alex Scroxton 27 Jul 2022

US State Department doubles a previously announced reward for information on North Korean cyber criminals, including the notorious Lazarus group Read More

Implement API rate limiting to reduce attack surfaces

By Kyle Johnson, Manning Publications Co. 28 Feb 2022

Rate limiting can help developers prevent APIs from being overwhelmed with requests, thus preventing denial-of-service attacks. Learn how to implement rate limiting here. Read More

VMware Workspace One flaw actively exploited in the wild

By Alexander Culafi 14 Apr 2022

Multiple threat intelligence providers have detected threat activity related to the VMware Workspace One flaw, including cryptocurrency mining activity. Read More

11 technology acronyms software developers need to know

By Darcy DeClute 27 Nov 2022

From YAGNI to TAGRI, or POC to MVP, here are 11, popular software technology acronyms that often confuse junior developers new to big software development projects. Read More

How to create Git submodules in GitHub and GitLab by example

By Cameron McKenzie 30 Apr 2021

In this GitHub submodule add example, we demonstrate how to take an independent GitHub repository, add a Git submodule and push back to the GitHub server. Read More

Top three questions about the Log4j vulnerability

By Aaron Tan 17 Jan 2022

Singapore’s Ensign Infosecurity answers the top three questions about the impact of the Log4j vulnerability Read More

Using A SASE Platform approach: What Are The Real Cost Benefits?

By Steve Broadhead 08 Jun 2022

Following on from my previous blog - where I talked about the real costs of going down the DIY/product portfolio integration route, rather than opting for a “here’s one they made earlier” solution ... Read More

Emsisoft releases DeadBolt ransomware decryption tool

By Alexander Culafi 31 Jan 2022

Emsisoft's DeadBolt ransomware decryption tool fixes broken decryptor keys issued by threat actors, and works only if the victim has paid the ransom and received a key. Read More