Article | February 10, 2020
Certain programming skills are always in demand—even among cybercriminals. Recently, an underground Russian forum known as XXS held a competition that sought to give away $15,000 in cash prizes to cybercriminal developers who could write an article or develop a proof-of-concept video on different topics, including searching for zero-day and one-day vulnerabilities and exploiting them, developing crypto algorithms, and how best to conduct an advanced persistent threat attack, according to an analysis conducted by security firm Digital Shadows.
Article | February 20, 2020
The Python programming language has been topping virtually every tech trend list for the past two years, so it was no surprise to see it earn another "most popular" ranking in O'Reilly's annual analysis of the most-used topics and the top search terms from its online learning platform. But the reason for Python's latest blue ribbon is worth noting: according to O'Reilly, it was demand among data scientists and artificial intelligence (AI) and machine learning (ML) engineers.
Article | August 6, 2020
Learning how to monitor etcd is of vital importance when running Kubernetes in production. Monitoring etcd will let you validate that the service performs as expected, while detecting and troubleshooting issues that could take your entire infrastructure down. Keep reading to learn how you can collect the most important metrics from etcd and use them to monitor this service. etcd is a foundational component of the Kubernetes control plane. It stores your cluster desired state (pods, secrets, deployments, etc.), among other things. If this service isn’t running, you won’t be able to deploy anything and the cluster can’t self-heal.
Article | August 18, 2020
Phishing and email-borne malware has a disproportionately large impact on the healthcare industry. Among the 3,950 breaches examined in the 2020 Verizon Data Breach Investigations Report, 521 took place within health care organizations, making the industry the most frequently victimized among those included in the report. Financially-motivated criminal groups are particularly likely to target health care organizations, and human error often plays a role in their success.