Juan C. Perez May 16, 2018September 6, 2020 - 10 min read DevSecOps: Practical Steps to Seamlessly Integrate Security into DevOps
Juan C. Perez May 15, 2018September 6, 2020 - 11 min read Securing the Hybrid Cloud: A Guide to Using Security Controls, Tools and Automation
Juan C. Perez May 14, 2018September 4, 2020 - 3 min read What we’ve got here is failure to communicate: OS vendors misread CPU docs, create flaw
Gill Langston May 8, 2018October 27, 2022 - 2 min read May 2018 Patch Tuesday – Medium Weight, However One Active Exploit Needs Attention
Juan C. Perez May 7, 2018September 4, 2020 - 6 min read Timely Password-Change Call from Twitter, as Bugs Hit WebEx and GPON routers
Juan C. Perez May 7, 2018December 21, 2022 - 8 min read How To Prioritize Vulnerabilities in a Modern IT Environment
Juan C. Perez April 27, 2018October 21, 2021 - 5 min read Gaining Control over Your Digital Certificates
Hari Srinivasan April 25, 2018September 6, 2020 - 10 min read When Preparing for GDPR, Don’t Neglect Public Cloud Security
Chris Carlson April 24, 2018September 6, 2020 - 3 min read Orangeworm Targeting Healthcare Industry since 2015 Now Exposed
Dave Ferguson April 23, 2018December 20, 2022 - 4 min read Qualys WAS Introduces Swagger Support for REST API Security Testing