5,064 Results for:blog

  • Sort by: 

AWS fixes 'FlowFixation' vulnerability for account hijacking

By Alexander Culafi 21 Mar 2024

A Tenable researcher discovered a session fixation flaw in AWS Managed Workflows for Apache Airflow that, combined with a misconfiguration, could enable account hijacking. Read More

Breaking down the barriers for Women in the tech industry

By Clare McDonald 01 Jun 2020

GUEST BLOG: In this contributed blog post Jess Jackson, investment director at GC Angels, discusses the difficulties female tech founders face when trying to enter the sector and find funding.  The ... Read More

Explainable BI: eliminating the black box of human decision-making

By Brian McKenna 15 Oct 2021

This is guest blog post by James Fisher, Chief Product Officer, Qlik No, it’s not a typo – Explainable BI. Not to be mixed up with its close relative, Explainable AI. It is rapidly becoming ... Read More

Midnight Blizzard accessed Microsoft systems, source code

By Alexander Culafi 08 Mar 2024

Microsoft said Midnight Blizzard used data stolen from a breach of its corporate email system to access other parts of the company's network, including source code repositories. Read More

Application modernisation cloud platform makes the impossible, possible

By Steve Broadhead 25 Jan 2021

Around this time last year, I was in London to cover off an event on platform migration for Rimo3, which I duly covered in this blog back then. ... Read More

Eclypsium: Ivanti firmware has 'plethora' of security issues

By Alexander Culafi 15 Feb 2024

In its firmware analysis, Eclypsium found that the Ivanti Pulse Secure appliance used a version of Linux that was more than a decade old and several years past end of life. Read More

Experts discuss stretched VLAN use cases, MEC and more

By Deanna Darah 19 Jul 2021

In this networking blog roundup, experts give reasons to stretch VLANs, discuss benefits of deploying private MEC with 5G, and differentiate between junior and senior IT engineers. Read More

Flaws in legacy D-Link NAS devices under attack

By Arielle Waldman 08 Apr 2024

Internet scans show threat actors are targeting CVE-2024-3273 in thousands of end-of-life D-Link NAS devices, and exploitation requires no authentication. Read More

Saying "no" to the 'status bro'

By Clare McDonald 07 Feb 2020

GUEST BLOG: In this contributed blog post, Evgeny Shadchnev, co-founder and CEO of Makers, explains why lists like the UK Women in Software list are important for the future of digital   I am ... Read More