Entrées par

,

June 1-3 Open Source RT-Thread IoT OS Global Tech Conference

The 2021 RT-Thread IoT OS Tech Conference has 1500+ developers registered for the conference, over 20 topics were shared, featured on the open-source RT-Thread OS projects and the new development RT-Smart Micro-Kernel OS, RISC-V ecosystems and associated manufacturers introduced, STM32 ecosystems, embedded projects showcase, IoT security, trending technical knowledge such as AI, ROS, Rust, Micropython, […]

,

After Inspection, Comes Adaptation: How to Do Action-Based Retrospectives Right

“At regular intervals, the team reflects on how to become more effective, then tunes and adjusts its behavior accordingly” — Agile Manifesto Self-reflection within teams is fundamental to enabling Agile ways of working. Let’s take the most common Agile methodology, Scrum. This framework prescribes five events, one of which is the retrospective. Source de l’article sur DZONE

, ,

AA22-138B: Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control

Original release date: May 18, 2022 | Last revised: May 19, 2022 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory (CSA) to warn organizations that malicious cyber actors, likely advanced persistent threat (APT) actors, are exploiting CVE-2022-22954 and CVE-2022-22960 separately and in combination. These vulnerabilities affect certain versions of VMware […]

,

What Even Is Web Design in 2022?

The term “web design” refers to the process of planning, organizing, and editing content online. On the surface, it seems like a simple enough concept. However, the reality is what we consider “web design” can change over time, influenced by our perception of the “web.”  In 2022, a professional web designer might create custom websites […]

,

Data Privacy Jobs Reportedly Growing While National Employment Slows

Companies in virtually all industries use the information to some extent. Often, most of an organization’s operations revolve around collecting and analyzing it. Of course, most people in modern society know and accept that, but they assert that businesses must do whatever’s necessary to keep data safe.  Recent data privacy report statistics show a high demand […]

, ,

AA22-138A: Threat Actors Exploiting F5 BIG-IP CVE-2022-1388

Original release date: May 18, 2022 Summary Actions for administrators to take today: • Do not expose management interfaces to the internet. • Enforce multi-factor authentication. • Consider using CISA’s Cyber Hygiene Services. The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are releasing this joint Cybersecurity Advisory […]

, ,

AA22-137A: Weak Security Controls and Practices Routinely Exploited for Initial Access

Original release date: May 17, 2022 Summary Best Practices to Protect Your Systems: • Control access. • Harden Credentials. • Establish centralized log management. • Use antivirus solutions. • Employ detection tools. • Operate services exposed on internet-accessible hosts with secure configurations. • Keep software updated. Cyber actors routinely exploit poor security configurations (either misconfigured […]

,

How To Use Cluster Mesh for Multi-Region Kubernetes Pod Communication

Thanks to services provided by AWS, GCP, and Azure it’s become relatively easy to develop applications that span multiple regions. This is great because slow apps kill businesses. There is one common problem with these applications: they are not supported by multi-region database architecture. In this blog, I will provide a solution for the problem […]

,

Exciting New Tools for Designers, May 2022

The underlying theme of this month’s collection of new tools and resources is development. Almost every tool here makes dev a little easier, quicker, or plain fun. There are a few great tutorials in the mix to help you get into the spirit of trying new things and techniques. Here’s what is new for designers […]