The Medium NewsletterinThe Medium BlogCrowdStrike: a root cause analysisIssue #127: how to communicate across continents & how to be non-judgmental1d ago7
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceLet’s Talk About Testing and C/C++: Was The CrowdStrike Bug A Pointer Problem?5d ago8
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…6d ago986d ago98
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Core Weakness of the Cybersecurity Industry: Lazy Key ManagementThere’s a problem within the cybersecurity industry. Whether it’s Microsoft not updating their Azure key pair for their cloud or SolarWinds…13h ago13h ago
Attila VágóinLevel Up CodingCrowdStrike Exposes The True Cause Of The Worldwide IT MeltdownWhat happens when redundancy and graceful degradation become an afterthought…6d ago976d ago97
The Medium NewsletterinThe Medium BlogCrowdStrike: a root cause analysisIssue #127: how to communicate across continents & how to be non-judgmental1d ago7
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceLet’s Talk About Testing and C/C++: Was The CrowdStrike Bug A Pointer Problem?5d ago8
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…6d ago98
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Core Weakness of the Cybersecurity Industry: Lazy Key ManagementThere’s a problem within the cybersecurity industry. Whether it’s Microsoft not updating their Azure key pair for their cloud or SolarWinds…13h ago
Attila VágóinLevel Up CodingCrowdStrike Exposes The True Cause Of The Worldwide IT MeltdownWhat happens when redundancy and graceful degradation become an afterthought…6d ago97
Marcin WolakHiring Ethical Hackers in 2024Finding highly skilled ethical hackers and penetrations testers has in the recent years become very challenging. Remote work & education…3d ago2
LarebSQL Injection in 5 mins //Just because of CURIOSITY //Assalamu alaekum gentlemen, I am happy to share that I found a SQL Injection in one of the web application of college . I was able to…1d ago
Enrique DansinEnrique DansCrowdstrike, cybersecurity and technology’s big house of cardsFor the last 24 hours, companies around the world have been reporting problems that are hampering their operations caused by a bad update…Jul 1918