Microsoft Office has long been a common attack vector, with abuse of its macro functionality a firm favorite of phishing and malspam attacks. These typically attempt to infect users through maliciously crafted Word or Excel files received as an attachment or as a...
Category:
Cloud DNS explained!
[unable to retrieve full-text content]
Building the data engineering driven organization from the first principles
[unable to retrieve full-text content]
Announcing Apigee’s native support for managing lifecycle of GraphQL APIs
[unable to retrieve full-text content]
Deploying the Cloud Spanner Emulator remotely
Developers & Practitioners Sneha Shah Software Engineer Stefan Serban Software Engineering Manager September 22, 2021 Next '21 registration is openJoin us October 12-14, 2021, for our digital flagship eventRegister nowWelcome to the third part of our series on the...
Microsoft Azure Virtual Training Day: Implementing Hybrid Infrastructure
[unable to retrieve full-text content]
Feature Spotlight: Introducing Singularity™ Conditional Policy
While security is taking the front row for many organizations, we still see too many others getting breached, facing the realities of ransomware, data theft, and extortion. These gaps require security professionals to be more efficient, flexible, and ready to face the...
Dual deployments on Vertex AI
Developers & Practitionersoverall workflow Changsung Park ML Google Developer Expert Sayak Paul ML Google Developer Expert September 22, 2021 Next '21 registration is openJoin us October 12-14, 2021, for our digital flagship eventRegister nowIn this post, we will...
Reach Me
Request a Call Back by filling out and submitting the following form.






