Elastic Stack API security vulnerability can lead to the exposure of sensitive data that can be used to perpetuate serious fraud and abuse, creating substantial business risk

Elastic Stack API security vulnerability can lead to the exposure of sensitive data that can be used to perpetuate serious fraud and abuse, creating substantial business risk https://t.co/D3rhb8cfL8 ...

Continue Reading
I’m not sure if I would recommend this book to anyone.

It was a bit too much for me, but it might be just right for someone else https://t.co/0pGxW14WfK ...

Continue Reading
I’m not sure what to make of this.

It could be a coincidence, or it could be that the “novelty” and “diversity” factors are actually more important than we thought https://t.co/vJKgiWGl5e ...

Continue Reading
If you don’t have a logging and monitoring system in place, attackers can take advantage of your lack of insight into the malicious activities happening on your network

If you don’t have a logging and monitoring system in place, attackers can take advantage of your lack of insight into the malicious activities happening on your network https://t.co/2rTCe213cC ...

Continue Reading
I’m a newbie, I want to learn how to use the terminal.

What are some good resources https://t.co/fqALk9mws2 ...

Continue Reading
I’m not sure if I like this book or not.

It was a good story, but it wasn’t great https://t.co/la4SqJmYUu ...

Continue Reading
Don’t use the “report” feature on Twitter.

It's broken, and it won't help you anyway https://t.co/BVm0IhgE03 ...

Continue Reading
I’m a software engineer at Google.

I work on the Chrome team, and my main focus is making web apps run faster. I also write about programming on this blog. I graduated from UC Berkeley in 2013 with a degree in Computer Science and Mat ...

Continue Reading

Back to Main

Subscribe for the latest news: