Latest security publications


Securing cloud-native apps with GitLab

At Cloud Expo Europe 2019, Techerati spoke to GitLab’s senior product marketing manager, John Jeremiah, about the steps that need to be taken to secure cloud-native applications Cloud-native applications turn the cloud into a force for creating business value by creating applications with the cloud specifically in mind. They improve the speed and efficiency of… Read More


Rubrik reportedly leaks massive customer database

A server security lapse exposed a huge database of customer information belonging to Rubrik, an IT security and cloud data management giant, TechCrunch reports The server was discovered by security researcher Oliver Hough, who found it was not password protected – essentially allowing anyone to rummage around inside if they knew where the server was located…. Read More


Canonical releases Ubuntu Core 18 OS for IoT devices

Ubuntu Core 18 is a lightweight operating system for IoT and embedded devices Canonical has officially launched Ubuntu Core 18, bringing the popular locked-down Linux distro Ubuntu 18 to small connected and embedded devices. Ubuntu Core 18 is a stripped down version of Ubuntu 18 and weighs in at a feather-like 260mb, but is packed with… Read More


Businesses in the dark over IoT breaches

Research indicates almost half of companies cannot tell if IoT devices have been breached Businesses are failing to implement effective IoT security strategies and almost half have no idea if their devices have been breached, according to security company Gemalto. Since the term IoT was coined, experts have sounded the alarm about the dangers of increasing… Read More


The inexorable rise of advanced persistent threats
John Bensalhia talks to Ian Thornton-Trump about the rise of the APT (Advanced Persistent Threat), and how organisations can best defend themselves  Advanced Persistent Threat (APT) is a relatively recent addition to the cybersecurity lexicon. It stands for a stealth computer network attack in which the attackers illegally gain access to a network and stay... Read More


Do NOT follow this link or you will be banned from the site!