AI and Automatio: Beyond the hype panel
this is a panel with Steph Wright - scottish ai alliance Martin Wallace - scottish local government Fraser Brown - Brewdog Ashley Beck - Scottish women in tech Muhil Vannan…
Securing an Agile World – NatWest
How security is embeded in their dev ops processes. A lot of it is cultural. how can you get teams of engineers building things and keep it secure ? Why…
2023 State of Operational Technology
2023 State of Operational Technology - Ben White Fortinet All about automated tech for delivering, picking, packing items etc These systems also need security, updating, etc Fortinet have a report…
DIGIT EXPO 2023
Today is digit expo in edinburgh, at the eicc. I was there past year (and the year before too, I think) Speakers include: Andrew Phillips, CTO, Skyscanner Alexia Cambon, Sr…
Kali purple cross-grade
This is a quick post on how to cross-grade from regular kali linux to kali-purple:1) make sure you have the correct kali sources for rolling-releases cat /etc/apt/sources.list # See https://www.kali.org/docs/general-use/kali-linux-sources-list-repositories/…
Testing an API for hackers
Leading on from the prev article - An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with…
subdomains brute force enum and finding tools
Enumerating subdomain when performing recon (or asset identification) is a task that you will (and should) perform regularly. Methods ScrapingBrute-forceAlterations & permutations of already known subdomains Online DNS tools spyse…
Vagrant for Beginners
Vagrant for Beginners Vagrant is a powerful tool that allows developers to easily create and manage virtual machines for development purposes. It provides a consistent and reproducible environment for software…
- Go to the previous page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- …
- 140
- Go to the next page