My Makefile for building this site, optimizing images, and running my CI/CD GitHub Actions flow. Fun fact: I first launched…
Precisely speaking, the heading is related to two different articles with different stories. The first one goes as follows: According…
As data breaches and cyber attacks continue to rise, the traditional method of securing online accounts using passwords is becoming…
Apr 19, 2023Ravie LakshmananSandbox / Software Security A fresh round of patches has been made available for the vm2 JavaScript…
When I joined HackerOne last year, the vitality of the hacker community drew me to this organization. And as Chief…
As cyberattacks increase in frequency and sophistication, small and medium-sized businesses (SMBs) become more vulnerable to cyber threats. Unlike larger…
On April 26 and 27, Las Vegas Convention Center will become home to the ultimate exhibition for the customer engagement…
TL/DR: Gender inequality and the lack of women is ubiquitous in tech companies – more so in cybersecurity. While it…
The Chinese-based Video surveillance equipment manufacturer has disclosed a critical flaw in their storage products, allowing threat actors to obtain…
Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of…
I’ve been going hardcore on using GPT to create essays, reports, and other kinds of analysis. I’ve had tons of…
How to take advantage of a simple GitHub Actions workflow without sacrificing agnostic tooling. Agnostic tooling is the clever notion…