Author: nlqip

Last Update: December 28, 2021 If you are reading this, you likely have heard about Log4Shell, the December, 2021 critical zero-day remote-code execution vulnerability, and subsequent vulnerabilities in the popular Log4j software library that is developed and maintained by the Apache Software Foundation. Apache has patched these vulnerabilities in version 2.17.1, however vendors who use…

Read More

[Links and resources updated on October 4, 2022] If you told me a year ago that I would meet a cold war hero at a birthday party, I wouldn’t have believed you. And I would be even more skeptical if you told me she would be an unintimidating, approachable music professor with an infectious smile.…

Read More

From what enterprises are seeing around GenAI ROI and the most popular GenAI use cases today, to the majority of enterprises using ChatGPT for software development, CRN breaks down the biggest results from ISG’s new 2024 State of The Generative AI Market report. Enterprises are spending on average $2.6 billion on their single largest generative…

Read More

So, here’s something that blew my mind: I decided to test Google’s NotebookLM AI tool. I casually uploaded the URLs for my LinkedIn page and my blog, not expecting much more than a basic summary. After about 3–4 minutes of AI whirring away, I had…a podcast in the form of a WAV file. Curious, I clicked…

Read More

Guy Guzner, a cybersecurity vet and CEO of SaaS identity security startup Savvy, tells CRN that adopting better security practices can also make life easier for workers. While few workers have ever enjoyed needing to interact with their cybersecurity team over a minor issue, the feeling is often mutual. The reality is that most security…

Read More

DAST vulnerability scanners are not that different from virus scanners. In both cases, the goal of the software is to find something out of the ordinary in the target. A virus scanner scans a computer’s local resources and storage to find potentially malicious software. A vulnerability scanner scans some kind of target to find potentially…

Read More

To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs, and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look at your options and the reasons why DAST is a…

Read More

The networking giant has agreed to invest in Nvidia-backed cloud AI upstart CoreWeave, a company that’s currently valued at $23 billion. Cisco Systems is reportedly investing in cloud AI upstart CoreWeave, an emerging player that’s currently valued at $23 billion. CoreWeave is a cloud computing provider that’s among the hottest companies in the AI arena.…

Read More

A new Acunetix Premium update has been released for Windows and Linux: 15.0.221007170. This Acunetix release introduces support for Red Hat Enterprise Linux (RHEL) 9, which has been released earlier this year. The PHP IAST AcuSensor can now be used with web applications that take advantage of the PHP Slim Framework, and has been updated…

Read More

Canadian video game developer Red Barrels is warning that the development of its Outlast games will likely be delayed after the company suffered a cyberattack impacting its internal IT systems and data. Although the statement emphasizes that the attack has not affected player data, the production timeline has been impacted. “The Red Barrels team regrets…

Read More