DevOps and the Log4j Attack
DevOps and CM Practices can identify risks with Log4j and other library based attacks. Ransomware, malware and denial of service attacks are all possible…
Continue ReadingDevOps and CM Practices can identify risks with Log4j and other library based attacks. Ransomware, malware and denial of service attacks are all possible…
Continue ReadingThe inaugural Cyber Research Conference Ireland has just been announced. This conference, chaired by Michael Lang and Séamus Dowling, will be held in GMIT…
Continue ReadingApplications run at peak use more often than we would like causing significant problems. In fact, 83% of IT practitioners state that they have…
Continue ReadingDevOps and Configuration Management (CM) go hand in hand. The IEEE 828 Configuration Management standard is under review.
Continue Reading