Although no-code has been a popular avenue for website builders to provide accessibility, developers still opt for options that offer code integration as an added layer of customization. Plenty of builders in the market still use intuitive drag-and-drop without sacrificing coding capabilities. With around 200 million active websites, you can bet that the added functionality […]
Security
kubernetes traefik – Managing TLS Certificates – Part 4
How to configure HTTPS for your applications on the Kubernetes cluster? How to manage TLS certificates using traefik? Traefik proxy is a very popular ingress controller in kubernetes environments. It supports both HTTPS (router) and TLS connections. This article explains how to configure TLS connection and obtain TLS certificates dynamically using pebble (Only for the […]
The Importance of Email Encryption for Your Business
Email encryption encrypts data sent and received by the user and data located on endpoints and servers. We know that email is the most commonly used way for businesses to communicate externally with customers and suppliers. Hundreds of millions of emails are sent on a daily basis as we send contracts, invoices, and critical business […]
Speculative Store Bypass Disable – CVE-2018-3639 – SSBD
Google [Jann Horn (Google Project Zero) ] and Microsoft [Ken Johnson (Microsoft Security Response Center) ] found another security flaw on the modern processor architecture. An unprivileged attacker can use this flaw to bypass restrictions in order to gain read access to privileged memory that would otherwise be inaccessible. This issue has been assigned CVE-2018-3639 and is […]



