Daily Shaarli
August 1, 2021
The author explains how he optimized the performance of conflict-free replicated data types.
Of the 170 registered incidents in 2020, 50 % were caused by system failures, 40 % by human errors, 7 % by natural phenomena, and 2 % by malicious actions.
»Four of the most targeted vulnerabilities in 2020 affected remote work, VPNs, or cloud-based technologies.«
Even a laptop following security best practices does not keep attackers from exploiting it. In this case, a TPM secured, FDE SSD was targeted.

This article summarizes the information on the upcoming z/OS 2.5 release.

In this post, the author shows that even if not always the most efficient solution, there still are use-cases where human-readable protocols shine.

In this article, Gareth Corfield comments on ENISA's supply chain attack report.
This blog post provides the reader with an in-depth look at eBPF and its security implications in general and details of the specific bug CVE-2021-3490.

»You're crazy if you don't start in the cloud; you're crazy if you stay on it.«