Quick Tips

Blue Modern Computer Service Business Card
Quick Tips

SSH-Snake Tool Used in Data Exfiltration Attacks

A new threat actor is finding success in relying on open-source software (OSS) security tools and a networking mapping tool called SSH-Snake in its campaigns. The group, which researchers with Sysdig call Cryst...

Blue Modern Computer Service Business Card
Quick Tips

CI/CD vs CI + GitOps: Why Kubernetes Demands a Different Deployment Model

It’s one of the most common missteps we see when teams adopt Kubernetes: they bring their existing CI/CD architecture with them. The same Jenkins pipelines, the same kubectl apply scripts, the same deployment t...

Blue Modern Computer Service Business Card
Quick Tips

Proactive Identity Security: Addressing Unmanaged Endpoint Risks

Computer and network security: Everyone knows they should be doing it better, but no one really knows all the best ways to do it. The computer security profession is a large and varied one, so — obviously — opi...