AI and Automatio: Beyond the hype panel
this is a panel with Steph Wright - scottish ai alliance Martin Wallace - scottish local government Fraser Brown - Brewdog Ashley Beck - Scottish women in tech Muhil Vannan…
this is a panel with Steph Wright - scottish ai alliance Martin Wallace - scottish local government Fraser Brown - Brewdog Ashley Beck - Scottish women in tech Muhil Vannan…
How security is embeded in their dev ops processes. A lot of it is cultural. how can you get teams of engineers building things and keep it secure ? Why…
2023 State of Operational Technology - Ben White Fortinet All about automated tech for delivering, picking, packing items etc These systems also need security, updating, etc Fortinet have a report…
Today is digit expo in edinburgh, at the eicc. I was there past year (and the year before too, I think) Speakers include: Andrew Phillips, CTO, Skyscanner Alexia Cambon, Sr…
This is a quick post on how to cross-grade from regular kali linux to kali-purple:1) make sure you have the correct kali sources for rolling-releases cat /etc/apt/sources.list # See https://www.kali.org/docs/general-use/kali-linux-sources-list-repositories/…
Leading on from the prev article - An API, or Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with…
Enumerating subdomain when performing recon (or asset identification) is a task that you will (and should) perform regularly. Methods ScrapingBrute-forceAlterations & permutations of already known subdomains Online DNS tools spyse…
Vagrant for Beginners Vagrant is a powerful tool that allows developers to easily create and manage virtual machines for development purposes. It provides a consistent and reproducible environment for software…
Regular Software Updates: The Key to Mac Security Software updates are crucial for maintaining the security of your Mac. Stay protected by regularly updating your system.