
Confidentiality, Integrity and Availability in Cyber Security
You have probably come across the term “CIA” in the news, movies or other media. When we think about the “CIA”, the first thing that pops up is most likely
You have probably come across the term “CIA” in the news, movies or other media. When we think about the “CIA”, the first thing that pops up is most likely
On October 4th, 2021, Facebook, Instagram and WhatsApp suffered a 6-hour outage as a result of a cascading Border Gateway Protocol (BGP) own-goal.
The Quebec National Assembly adopted a new privacy law, formally titled An Act to modernize legislative provisions regards the protection of personal information, on September 22, 2021. Known as Bill
If you are a student looking to get into security, here are some things to consider.
Explore why you should apply other security policies beyond AuthN and AuthZ, the importance of appropriate logging and monitoring, and the use of policies at the group level to build more secure applications that are based on APIs and microservices.
Explore why you should apply other security policies beyond AuthN and AuthZ, the importance of appropriate logging and monitoring, and the use of policies at the group level to build more secure applications that are based on APIs and microservices.