Secure software development using zero trust

Zero trust is often discussed in terms of networks, devices, and infrastructure because these are usually the first line of defense against external threats. However, as modern software development moves toward microservices, APIs, infrastructure-as-code and cloud architectures, the boundaries betwe...

Oct 23 2024

Send cyber junk to your Pi-hole: Protect your home network

In today's world of digital advertisements, telemetry, and data collection, Pi-hole provides a layer of protection to your home network. It's simple to set up, consumes little resources, and requires no maintenance. What is Pi-hole? Pi-hole is an open source software application that runs on a compu...

Oct 22 2024