#security
The most astonishing fact revealed by the survey was that 87 percent of manufacturing companies have a disaster recovery plan in place for all data security concerns. But only 37% of them have it in documented and tested state.
https://www.cybersecurity-insiders.com/study-confirms-manufacturing-companies-are-more-vulnerable-to-cyber-attacks/
The most astonishing fact revealed by the survey was that 87 percent of manufacturing companies have a disaster recovery plan in place for all data security concerns. But only 37% of them have it in documented and tested state.
https://www.cybersecurity-insiders.com/study-confirms-manufacturing-companies-are-more-vulnerable-to-cyber-attacks/
Cybersecurity Insiders
Study confirms Manufacturing companies are more vulnerable to Cyber Attacks - Cybersecurity Insiders
Companies involved in manufacturing business are said to be more exposed to cyber attacks. This was revealed in a Deloitte study, titled Manufacturers Alliance for Productivity and Innovation (MAPI). According to MAPI, 40 percent of manufacturing firms experienced…
Forwarded from Fullstack разработчица живет в nestjs
"Horizontal Scalability Options in PostgreSQL - Highgo Software Inc." https://www.highgo.ca/2021/08/09/horizontal-scalability-options-in-postgresql/
Highgo Software Inc. - Enterprise PostgreSQL Solutions
Horizontal Scalability Options in PostgreSQL
So for one reason or another you have decided that you need horizontal scalability and you need to achieve it with PostgreSQL as your database. So what options do you have?
#security #tools
https://appsecmap.com/ - A good list of different AppSec tools, grouped by categories with short descriptions and links. It will be useful to quickly research/solution selection.
https://appsecmap.com/ - A good list of different AppSec tools, grouped by categories with short descriptions and links. It will be useful to quickly research/solution selection.
Appsecmap
AppSec Map
A map of AppSec service providers and solutions
#security #password
Attackers are using many types of attacks to compromise business-critical data. These can include zero-day attacks, supply chain attacks, and others. However, one of the most common ways that hackers get into your environment is by compromising passwords.
The password spraying attack is a special kind of password attack that can prove effective in compromising your environment. Let's look closer at the password spraying attack and how organizations can prevent it:
https://thehackernews.com/2021/08/how-companies-can-protect-themselves.html
Attackers are using many types of attacks to compromise business-critical data. These can include zero-day attacks, supply chain attacks, and others. However, one of the most common ways that hackers get into your environment is by compromising passwords.
The password spraying attack is a special kind of password attack that can prove effective in compromising your environment. Let's look closer at the password spraying attack and how organizations can prevent it:
https://thehackernews.com/2021/08/how-companies-can-protect-themselves.html
#video #5G #security in #Ukrainian
What makes 5G mobile network different from the previous generations? Why 5G security becomes crucial topic of nowadays? Which standards, frameworks and best practices support market players to provide security assurance in this area?
https://youtu.be/kUuCF-POB6Q
What makes 5G mobile network different from the previous generations? Why 5G security becomes crucial topic of nowadays? Which standards, frameworks and best practices support market players to provide security assurance in this area?
https://youtu.be/kUuCF-POB6Q
YouTube
5G Security - Challenges and Responses (Sergiy Rekun)
What makes 5G mobile network different from the previous generations? Why 5G security becomes crucial topic of nowadays? Which standards, frameworks and best practices support market players to provide security assurance in this area?
#docker #WSL #Windows
https://www.bleepingcomputer.com/news/microsoft/easywsl-turns-linux-docker-images-into-a-windows-10-wsl-distro/
https://www.bleepingcomputer.com/news/microsoft/easywsl-turns-linux-docker-images-into-a-windows-10-wsl-distro/
BleepingComputer
EasyWSL turns Linux docker images into a Windows 10 WSL distro
If you can't find your favorite Windows Subsystem for Linux distribution available in the Microsoft Store, a new program called EasyWSL can convert almost any Linux Docker image into a WSL distro.
#security
Another #RCE vulnerability in #Windows print spooler:
https://thehackernews.com/2021/08/microsoft-security-bulletin-warns-of.html
Another #RCE vulnerability in #Windows print spooler:
https://thehackernews.com/2021/08/microsoft-security-bulletin-warns-of.html
Forwarded from xkcd
'I tried to train an AI to repair my Python environment but it kept giving up and deleting itself.'
#video #programming #dotNET #microservices
11 hours! 😱
In this step-by-step tutorial I take you through an introduction on building microservices using .NET. As the name suggests we build everything completely from start to finish –with the full scope of the course outlined in the time-stamp section below. However, at a high-level we’ll cover:
• Building two .NET Microservices using the REST API pattern
• Working with dedicated persistence layers for both services
• Deploying our services to Kubernetes cluster
• Employing the API Gateway pattern to route to our services
• Building Synchronous messaging between services (HTTP & gRPC)
• Building Asynchronous messaging between services using an Event Bus (RabbitMQ)
https://youtu.be/DgVjEo3OGBI
11 hours! 😱
In this step-by-step tutorial I take you through an introduction on building microservices using .NET. As the name suggests we build everything completely from start to finish –with the full scope of the course outlined in the time-stamp section below. However, at a high-level we’ll cover:
• Building two .NET Microservices using the REST API pattern
• Working with dedicated persistence layers for both services
• Deploying our services to Kubernetes cluster
• Employing the API Gateway pattern to route to our services
• Building Synchronous messaging between services (HTTP & gRPC)
• Building Asynchronous messaging between services using an Event Bus (RabbitMQ)
https://youtu.be/DgVjEo3OGBI
YouTube
.NET Microservices – Full Course
In this step-by-step tutorial I take you through an introduction on building microservices using .NET. As the name suggests we build everything completely from start to finish –with the full scope of the course outlined in the time-stamp section below. However…