RALEIGH, N.C. -- November 1, 2019 -- Red Hat, Inc., the world's leading provider of open source solutions, today announced the latest release of Red Hat Process Automation, unveiling new applied artificial intelligence (AI) capabilities for predictive decision...
Category:
Building A Custom Tool For Shellcode Analysis
The Zero2Hero malware course continues with Daniel Bunce demonstrating how to write a custom tool to load, execute and debug malicious shellcode in memory. Recently, FireEye posted a blog post detailing malware used by APT 41, specifically the DEADEYE initial first...
Help Protect Your Infrastructure Against DDoS Attacks
Register for this webinar to learn how Azure DDoS Protection can help secure your infrastructure against DDoS attacks, and the steps to take to ensure your readiness. Thu, 31 Oct 2019 17:00:00 GMT (UTC) Sign in to register - Or - ...
How GCP helps you take command of your threat detection
Why do we keep talking about security all the time? Why hasn't anyone just gone and fixed it?You've probably heard these questions, whether from your leadership, or a board member, or just from friends. Then you labor at explaining why security in the cloud is so...
Keep Parquet and ORC from the data graveyard with new BigQuery features
"At Pandora, we have petabytes of data spread across multiple Google Cloud storage services; accordingly, we expect BigQuery's federated query capability to be a useful tool for integrating our diverse data assets into a unified analytics ecosystem," says Greg...
Protecting your GCP infrastructure at scale with Forseti Config Validator part three: Writing your own policy
Identity & Security Adrien Walkowiak Strategic Cloud Engineer October 31, 2019 Try GCPGet $300 free credit to spend over 12 months.Free TrialNo two Google Cloud environments are the same, and how you protect them isn't either. In previous posts, we showed you how...
Exploring container security: Use your own keys to protect your data on GKE
Note that you can only use CMEK to protect data on new persistent disks attached to nodes in your cluster--you cannot use it to protect existing persistent disks. Nor can you use CMEK to protect node boot disks or control plane disks. To use CMEK with regional...
New KB articles published for the week ending 26th October,2019
VMware Cloud on AWSHow to Export Firewall Rules from your SDDCPublished Date:23-10-2019 VMware Horizon Insecure CORS configuration is enabled by default on older versions of Horizon 7Published Date:23-10-2019 VMware Horizon Client Horizon Client 5.2 and older version...
Reach Me
Request a Call Back by filling out and submitting the following form.




