Blog

IT services for startups

IT services for startups

Startups are as popular as they were at the start of their occurrence. This kind of business is quite suitable for solo entrepreneurs, small and big companies as well. Usually, startup owners are very creative people who quickly come up with the idea and need to accomplish it fast. There are a few points to…

Read More Read More

The Router’s Obstacle-Strewn Route to Home IoT Security

The Router’s Obstacle-Strewn Route to Home IoT Security

It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of Internet of Things security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for anyone who owns a…

Read More Read More

Isn’t It Time to Buy Cyber Insurance?

Isn’t It Time to Buy Cyber Insurance?

Every day we read stories about data breaches and cyberattacks on business and government websites, and the resulting the loss of personally identifiable information (PII). Cybercrime is on the rise, and given the ever-evolving methods of attack, meaningful relief and reliable measures to fend off cybercriminals are unlikely in the foreseeable future.

For the Love of Bricks

For the Love of Bricks

I’ve been spending time this summer barnstorming Barnes & Noble bookstores in New England signing copies of my book on repairing climate change, The Age of Sustainability. These were my first visits to bookstores as a seller, not a customer — and I previously hadn’t visited a store in a while. I wasn’t prepared for…

Read More Read More

Why Coded Enterprises are Winning at DevOps

Why Coded Enterprises are Winning at DevOps

More than 10 years ago ushered in the era of DevOps with the introduction of , the “infrastructure as code” tool. Fundamental to the success of was the belief that “the best way to build software is to do it in close collaboration with the people who use it.” Today there are more than 70,000…

Read More Read More

Don’t Leave Your S3 Buckets Wide Open

Don’t Leave Your S3 Buckets Wide Open

IT security can feel like an endless war against the unknown. Especially when your big old comfortable monolith with one access point gets spread out into a million small microservice pieces all over the place. Securing distributed systems is a challenge that requires constant vigilance and attention to detail. 

Lenovo confirms faulty NAS drives exposed 36TB of sensitive data

Lenovo confirms faulty NAS drives exposed 36TB of sensitive data

Lenovo has confirmed that a vulnerability in one of its legacy network-attached storage (NAS) drives was the cause of a gigantic 36TB data leak. The “trivially easy” to exploit vulnerability was found in a range of Lenovo-EMC NAS devices which allowed an unauthorised user to access the drive’s contents through its application programming interface (API).

Popular Chrome and Firefox extensions leak sensitive user information to third-party resellers

Popular Chrome and Firefox extensions leak sensitive user information to third-party resellers

Popular browser extensions in Google Chrome and Mozilla Firefox have been revealed to be selling highly sensitive data belonging to four million users as part of a “murky data economy”. The eight apps in question, some of which have more than a million users, warn users that they can “read and change all your data…

Read More Read More

What is data processing?

What is data processing?

Most organisations will process data in some way at some time, but what does the term ‘data processing’ mean? In essence, it is the collection and manipulation of data to produce new relevant information. It can also include the collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or…

Read More Read More