dcsimg

The best test for an EDR solution is one that works for you

Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the cyber landscape and meet customers’ needs for an effective and simple solution that just works. But finding something that just works means something quite different for every business, depending on their size, security expertise, and … [Read more...]

How to Automate Azure Cloud Deployments with Azure ARM Templates

In this article, you’re going to learn how to create a simple Azure ARM template and deploy it into Azure using the Azure CLI. … [Read more...]

Is Ethical AI Development Possible?

When you consider all the implications of a world where AI rules supreme, are ethics even possible? … [Read more...]

What is Kubernetes?

Most answers to the question, “What is Kubernetes?” follow a pattern. It’s open-source. It’s a container-orchestration system. It automates application deployment, scaling, and management. All are true. … [Read more...]

Part 3 – Getting Started with Azure Automation: Managing Assets

In this article, you will learn about Azure Automation Assets. You will also learn how to add assets to your automation account that your runbooks can then use at runtime. … [Read more...]

Part 2: Creating your first Azure Automation RunBook

In this article, you will learn about the different types of runbooks (yes, there’s more than one of them), how to create a new runbook, and how to add code to that runbook. … [Read more...]

Getting Started with Azure Automation: Introduction

One of the most popular automation tools is Azure Automation and this will be a series of posts covering the introduction to Azure Automation, creating automation runbooks, dealing with assets, testing and publishing runbooks. … [Read more...]

Caution: Misuse of security tools can turn against you

We have a saying in Greece: “They assigned the wolf to watch over the sheep.” In a security context, this is a word of caution about making sure the tools we use to keep our information private don’t actually cause the data leaks themselves. In this article, I will be talking about some cases that I have come across in which security tools have leaked data they were intended … [Read more...]

Why IT Automation is the Backbone of Every DevOps Transformation

DevOps! Over the past half-decade, the illustrious marriage between Development and Operations has simultaneously become the biggest buzzword in tech since ~The Cloud~, and a critical piece of software engineering and delivery methodology. But to many, the DevOps Lifestyle™ remains a mystery—an agile paradise just out of sight. So what is DevOps, exactly, and where does it all start? … [Read more...]

How 5G could impact cybersecurity strategy

With the recent news that South Korea has rolled out the world’s first 5G network, it’s clear that we’re on the precipice of the wireless technology’s widespread launch. Offering speeds anywhere from 20 to 100 times faster than 4G long-term evolution (LTE), the next generation of wireless networks will also support higher capacities of wireless devices. That’s a huge deal considering the rise … [Read more...]