Tag: Infosec
-
New world, new rules: Cybersecurity in an era of uncertainty - The C-suite playbook
Posted on October 17, 2025, Level beginner Resource Length medium
As geopolitical instability and technological advancements create new challenges for cybersecurity, business leaders are grappling with how to best respond. PwC's 2026 Global Digital Trust Insights survey indicates that 60% of executives rank cyber risk investment as a top strategic priority. By PricewaterhouseCoopers.
Tags infosec web-development app-development cio
-
What is the Model Context Protocol (MCP) and how it works
Posted on October 7, 2025, Level beginner Resource Length long
The Model Context Protocol (MCP) standardizes how large language models connect with external data and tools, eliminating the need for custom integrations between different AI systems and services. Released by Anthropic, MCP enables developers to build context-aware applications without reinventing wheel for each model-to-system pairing, solving the "NxM problem" of redundant development and maintenance efforts across countless LLMs and tools. By descope.com.
Tags ai servers infosec devops web-development app-development
-
Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud worm
Posted on October 5, 2025, Level beginner Resource Length short
Supply chain attacks targeting open-source packages pose a significant threat; proactive measures like dependency auditing and robust security tools are crucial for developers. By Chi Tran, Charlie Bacon, Nirali Desai.
Tags ai cio infosec software learning management aws
-
Experts alarmed that AI is now producing functional viruses
Posted on October 1, 2025, Level beginner Resource Length short
AI's ability to design functional viruses presents a dual-edged sword – offering potential cures while simultaneously raising severe bioweaponization risks demanding proactive mitigation strategies. By Frank Landymore.
Tags ai infosec programming search data-science
-
Cloud-native security in 2025: Why runtime visibility must take center stage
Posted on September 20, 2025, Level intermediate Resource Length medium
The article from The Hacker News outlines the transformative shift in cloud-native application security as industries increasingly adopt containerized and serverless architectures. This evolution has expanded attack surfaces beyond what traditional security models can effectively manage. It introduces runtime visibility as a critical component for contemporary security strategies, allowing teams to understand active threats within production environments. By The Hacker News.
Tags infosec cio devops cloud servers serverless
-
Rate limiting for Django websites
Posted on September 4, 2025, Level intermediate Resource Length long
Rate limiting restricts the number of requests a client can make to your Django website within a specific timeframe. It's especially useful for blocking malicious bots, crawlers, or brute-force attacks that overwhelm server resources. By Aidas Bendoraitis.
Tags nginx devops infosec devops kubernetes
-
Securing Kubernetes resources without a VPN
Posted on September 4, 2025, Level intermediate Resource Length long
Securing kubernetes resources that you want to expose to only some users externally is often done through IP allowlisting and a VPN. While this is a tried and true method, there are some drawbacks. By Brian Sizemore.
Tags nginx app-development infosec devops kubernetes
-
Container registry SSL and K8s Kind
Posted on July 29, 2025, Level advanced Resource Length long
AI safety discussions predominantly focus on easy to conceptualise, highly salient risks including algorithm bias, hallucinations and disinformation. While these are crucial concerns, they overlook a fundamental truth we've learned from other high-stakes fields like aviation and healthcare: sometimes the most dangerous risks can hide in plain sight. By Manu Savani.
Tags ai cio infosec software learning management
-
How to use rsnapshot for incremental backups on Raspberry Pi
Posted on July 22, 2025, Level beginner Resource Length short
After trying out several backup tools over the years, rsnapshot has proven to be one of the most reliable, and setting it up on a Raspberry Pi is easier than you might think. As you know, maintaining our Raspberry Pi infrastructure is crucial. Data loss can disrupt projects and impact efficiency, so we need a robust backup solution. The article highlights `rsnapshot`, a powerful open-source tool that provides an excellent way to automate incremental backups on our Pis. Let me show you how it all works. By Usman Qamar.
Tags linux open-source infosec servers
-
Addressing hidden risks in AI implementation for safety
Posted on July 14, 2025, Level beginner Resource Length long
AI safety discussions predominantly focus on easy to conceptualise, highly salient risks including algorithm bias, hallucinations and disinformation. While these are crucial concerns, they overlook a fundamental truth we've learned from other high-stakes fields like aviation and healthcare: sometimes the most dangerous risks can hide in plain sight. By Manu Savani.
Tags ai cio infosec software learning management
-
Multimodal AI for IoT devices requires a new class of MCU
Posted on July 2, 2025, Level beginner Resource Length long
Context-aware computing enables ultra-low-power operation while maintaining high-performance AI capabilities when needed. The rise of AI-driven IoT devices is pushing the limits of today's microcontroller unit (MCU) landscape. While AI-powered perception applications—such as voice, facial recognition, object detection, and gesture control—are becoming essential in everything from smart home devices to industrial automation, the hardware available to support them is not keeping pace. By Todd Dust.
Tags programming cloud ai infosec servers iot how-to
-
The edge of security: How edge computing is revolutionizing cyber protection
Posted on July 1, 2025, Level beginner Resource Length medium
The traditional centralized model of cloud computing presents significant cybersecurity risks, creating a single point of failure and suffering from latency that can delay critical security updates. Edge computing emerges as a superior, decentralized solution that brings processing power closer to where data is generated. By Andrew Garfield.
Tags programming cloud cio infosec servers iot