Paying the pirates has never been a good idea. The long history shows that paying the ransom only increases the financial incentives for more ransoms. Here is how you can use Threat Actor / Capability modeling and practically free counter measures to protect yourself.
Since there is no Internet coast guard coming to your aid, here are the top five tips for your company to be better prepared for your own self-defense against cyber attack.
Lava Lamps as a security tool is an old idea, once covered by a patent. This is why I proudly display a Lava Lamp in my office within my web cam shot.
Testing, while not always glorious, is a vital part of a good code base. Tests and code should go hand in hand.
Working on numerous projects can require significant time to set up locally. With Docker, we have streamlined this process to mere minutes.
Technology purchases cannot solve application security. Improving security is a matter of people, processes, and technology. Here's how to invest developer education and processes first.
Running multiple Docker images locally can eat up a lot of disk space. Computers with smaller hard drives will have a problem keeping up. We can mitigate this issue by setting up an encrypted external ssd to run our Docker images and free up local disk space
As a computing professional, top end computers are a necessity for your livelihood. Here's how setting aside just $69/month will ensure you can buy a new computer at any time and have the funds for guilt free technology splurges.
Why I optimize for redundancy via RAID and multiple computers as a developer for whom development time is money instead of relying on a single high end laptop.