With a whopping 2.2 billion gamers and $46.1B in revenue for mobile games (42% of the market), chances are you and\or your loved ones play mobile games. Children are no exception, according to a Nielsen research piece from earlier this year, most children get their own mobile phone between ages 10 – 12. It seems that
A trove of data containing the personal information of more than 60 million South African citizens has been breached in the biggest data breach to hit South Africa. The breach was discovered by security researcher and creator of Have I Been Pwned, Troy Hunt.
Being a part of today’s tech-industry, you probably notice all winds blowing towards the implementation of DevOps and CI\CD methodologies, and rightfully so. Today’s software developers face an ever growing need for speedy development-to-production cycles with uncompromising security and reliability. One way of facing the speed versus quality challenge is the introduction of microservices.
When we discuss vulnerabilities in applications, there are different categories that we come across. Some vulnerabilities are extremely common yet allow for little or no damage should an attacker discover and exploit them, while others are incredibly rare but can have major, lasting impact on the organizations behind the attacked application. Then, there’s the third
Happy October! And we all know what that means… Cooler weather, fuzzy sweaters, pumpkin spiced everything, and National Cyber Security Awareness Month (NCSAM). In honor of NCSAM, we’re taking a dive into the world of mobile and will be sharing ways to keep your developers #CyberAware so that you don’t fall victim to some of
Today’s business cycles require faster and more innovative results more than ever before in order to stay competitive. As organizations speed up their time to market, they are realizing the waterfall methodology is no longer working. Now they are creating and adopting rapid application development methodologies. One of those methodologies, agile software development is arguably
All data breaches are bad, but this past Thursday the United States was shook by one of the biggest breaches the world has ever seen. Equifax, a credit monitoring company, disclosed that the breach of its system exposed the Social Security Numbers, driver’s licenses, phone numbers, birthdays and addresses of as many as 143 million
New research shows that at the end of 2016, predictions were being made that the amount of cyberattacks are set to double in 2017 – as we are inching towards the end of 2017, those predictions were made true. And then some. August proved to be a busy month, with cyberattacks hitting every sector and
Acclaimed by the DevOps world and best known as the leading open source automation server for continuous integration (CI) and continuous delivery (CD), Jenkins is a Java-based program designed to monitor a set of executions in a software environment. Jenkins allows developers to rapidly detect and resolve errors in the code base and boosts automated