Transforming Vulnerability Management: Bridging Gaps with Generative AI in CybersecurityNov 11, 2023Nov 11, 2023
Published inBuilding VTSBuilding an Application Security Program at VTSAt VTS, security is of utmost importance. Our products are the commercial real estate industry’s cutting-edge technology providing…Aug 23, 2023Aug 23, 2023
Using Shipa.io to simplify Kubernetes adoptionKubernetes is undoubtedly one of the fastest growing open source projects of modern times. It was designed by Google (based on Borg) and…Feb 5, 2021Feb 5, 2021
Published inSlalom BuildSlalom Launches the DevOps Dojo Series In Toronto!Staying on top of all the latest technologies can be a tough job. One could call it nearly a full-time job considering that there are so…Jun 26, 2018Jun 26, 2018
The 5 Factors of AuthenticationNowadays, the terms “Multi-Factor Authentication”, “Two-Factor Authentication” or “Dual-Factor Authentication” are becoming more and more…Dec 8, 20173Dec 8, 20173
Published inFlytServerless approach to security automation [part 3]N.B. This post was originally published by Renan on BSD Magazine.Dec 15, 2016Dec 15, 2016
Published inFlytServerless approach to security automation [part 2]N.B. This post was originally published by Renan on BSD Magazine.Dec 15, 2016Dec 15, 2016
Published inFlytServerless approach to security automation [part 1]N.B. This post was originally published by Renan on BSD Magazine.Dec 15, 2016Dec 15, 2016