Open-source malware doubles, data exfiltration attacks dominate
There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source malware packages identified in Q1…
There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source malware packages identified in Q1…
Someone pointed out this Gentoo flame article the other day and I just got around to finally reading it. Well, it was lame. Not because…
Zero to Engineer is a practical guide for anyone looking to launch a career in information technology without a traditional college degree. The book draws…
I just got back from the grocery store, and I feel like utter crap. My girlfriend and I were in line behind a young couple;…
Monash College overhauled its enterprise performance management as part of a broader finance transformation, helping it navigate and forecast the revenue impact of international student…
So I’ve had a theory for many years now. It’s not particularly poignant or anything, but I figured it’s my blog so I might as…
Laing O’Rourke Australia is using artificial intelligence tools to reformat existing content into videos that it can use on a centralised learning and development portal…
Markus Ranum is a highly-respected (for good reason) information security professional who has done a ton of cool stuff during his multiple decades in the…
I will, in the course of my information security career, become well versed on the topic of Digital Rights Management. The reasons for this are…
October 2005 For no particular reason at all I just feel like mentioning how much I like, and have always liked, Indian people. To start…
Accidentally deleted some photos from your iPhone? You’re definitely not alone; most iPhone users have done it at some point. The good news is that…
Many people who read this blog are familiar with what I call passive learning — the phenomenon that causes one to be far better at…