The Medium NewsletterinThe Medium BlogCrowdStrike: a root cause analysisIssue #127: how to communicate across continents & how to be non-judgmental2d ago8
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceLet’s Talk About Testing and C/C++: Was The CrowdStrike Bug A Pointer Problem?6d ago9
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…Jul 2099Jul 2099
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Next Great Thing(s) In Cybersecurity: Post Quantum Cryptography and Homomorphic Encryption[After a day of compiling C++ code into a useable library, and then getting it integrate with Microsoft Code, here’s a code example]5h ago5h ago
Attila VágóinLevel Up CodingCrowdStrike Exposes The True Cause Of The Worldwide IT MeltdownWhat happens when redundancy and graceful degradation become an afterthought…6d ago1036d ago103
The Medium NewsletterinThe Medium BlogCrowdStrike: a root cause analysisIssue #127: how to communicate across continents & how to be non-judgmental2d ago8
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceLet’s Talk About Testing and C/C++: Was The CrowdStrike Bug A Pointer Problem?6d ago9
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…Jul 2099
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Next Great Thing(s) In Cybersecurity: Post Quantum Cryptography and Homomorphic Encryption[After a day of compiling C++ code into a useable library, and then getting it integrate with Microsoft Code, here’s a code example]5h ago
Attila VágóinLevel Up CodingCrowdStrike Exposes The True Cause Of The Worldwide IT MeltdownWhat happens when redundancy and graceful degradation become an afterthought…6d ago103
Marcin WolakHiring Ethical Hackers in 2024Finding highly skilled ethical hackers and penetrations testers has in the recent years become very challenging. Remote work & education…4d ago2
AnonymousshettyDiscovered Sensitive Data Exposure on Wati.com: A Case Study Using Sublist3r and DirBusterIn the realm of web security, finding sensitive information inadvertently exposed on the internet can be both alarming and enlightening…7h ago
Enrique DansinEnrique DansCrowdstrike, cybersecurity and technology’s big house of cardsFor the last 24 hours, companies around the world have been reporting problems that are hampering their operations caused by a bad update…Jul 1918