Whether from the DevOps to modern DevSecOps, Linux operating system dominance the use case. You saw how Windows makes WSL Windows subsystem Linux work in Windows operating system, Mac support virtual machine and docker, and IBM acquired Red Hat, you get the feel for what is going on. When in the DevSecOps, it does not
A lot of people focus on artificial intelligence (AI) and how it steals your job mentality. Since it can run 24 hours x 365 days a year and never stop. You see how it operates robotics in producing a variety of mass customization “on-demand” products in most of the advanced and complex high tech products, you will
Today we want to talk about the innovators dilemma, as we all know new disruptive innovations happen time from time. It is always the new technologies that are invented to address existing problems that once success, will kill off great enterprise at that time, since what they represented as the business model and product of
Next Generation Application Security Testing (AST), it is nothing new, borrows the term from firewall to next generation firewall (NGFW), so here the term Next Generation Application Security Testing (NGAST). For those involved in the application security testing (AST) for 10 years or more, will know that, technology keeps advancing and various mega technology from
The world is moving toward a digital economy for decades now, a lot of change is underway. Whether as existing banking sector players or new entrants unlocked by the digital economy to offer digital bank solutions, we can see for what is going right now. From the case for stopping the Jack Ma Ant’s mega
In this post we are talk about Web Application Firewall (WAF) Auditing Solution, how you know whether the WAF being deployed securely and configure right, and how to audit it whether can be bypass WAF and exploit web application (web app, portal, modern website) by perform various web application attack to test for the WAF