Cyber security news for all

More

    Instructions

    Apple and Google facilitate technical foundation for data protection

    Apple and Google want to facilitate the development of apps for tracking corona infections. They rely on the detection of distances using Bluetooth technology...

    DevOps practices are designed to write safer codes

    Satisfied developers write safer code and are measurably more productive about DevSecOps practice. The seventh edition of the annual survey examines what makes developers...

    Microsoft has introduced a new Linux security module

    Microsoft says that the need arises from the fact that the majority of corporate customers now use Linux servers. Extensions For The Linux Kernel That...

    How is the authentication carried out on an OAuth 2.0 authorization server?

    The Twitter client should have access to the account so that they can read and publish posts. However, you do not want to give...

    Software providers are still overwhelmed with the security of IoT devices in 2020

    Total global IoT security spending was last year almost 2 million dollars. The trend for the coming years is clearly growing up. Given the...

    Check your health data carefully before installing apps that contain cyber risks

    Health data is known to be particularly sensitive. This leads to uncertainties in dealing with the influence of the corona pandemic. Basically, the duty...

    Recent Articles