Data privacy automation: Unlock your most valuable asset

In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the company. That’s because data privacy is fundamentally a data issue, with … Continue reading Data privacy automation: Unlock your most valuable asset

Automating Red Team Homelabs: Part 1 – Kali Automation

Homelab infrastructure got you down? Well, not anymore! This is the first post of a 3-part series that will talk about how to automate your home lab, from your kali box to all your vulnerable and domain-joined test vms. It will teach you how to keep yo… Continue reading Automating Red Team Homelabs: Part 1 – Kali Automation

Automagic Tool makes KiCAD Schematic Symbols from PDFs

Last time we talked about a KiCAD tool it was to describe a way to make the zen-like task of manual assembly more convenient. But what about that most onerous of EE CAD tasks, part creation? Home makers probably don’t have access to expensive part library subscriptions or teams of people to create parts for them, so they are left to the tedium of creating them by hand. What if the dream tool existed that could read the darn PDF by itself and make a part? It turns out [Sébastien] made that tool and it’s called uConfig.

uConfig has a …read more

Continue reading Automagic Tool makes KiCAD Schematic Symbols from PDFs

The How and Why of Tungsten Carbide Inserts, and a Factory Tour

It seems a touch ironic that one of the main consumables in the machining industry is made out of one of the hardest, toughest substances there is. But such is the case for tungsten carbide inserts, the flecks of material that form the business end of most of the tools used to shape metal. And thanks to one of the biggest suppliers of inserts, Sweden’s Sandvik Coromant, we get this fascinating peek at how they’re manufactured.

For anyone into machining, the video below is a must see. For those not in the know, tungsten carbide inserts are the replaceable bits …read more

Continue reading The How and Why of Tungsten Carbide Inserts, and a Factory Tour

ThreatList: Attacks on Industrial Control Systems on the Rise

The main source of infection on industrial control systems was the internet, researchers at Kaspersky Lab found in a new report. Continue reading ThreatList: Attacks on Industrial Control Systems on the Rise

There are no real shortcuts to most security problems

For Xerox Chief Information Security Officer Dr. Alissa Johnson, human ingenuity, partnerships and automation are the answer to most security problems the company has encountered and might yet encounter. “The future is an amalgamation of many fut… Continue reading There are no real shortcuts to most security problems

VMworld 2018 Executive Wrap-up: WorkSpace One, vSphere, Cloud Management

WorkSpace One, vSphere, Cloud Management are the hot buzzwords leaving VMworld and Mike breaks down the latest on these products following the conference in Las Vegas.

The post VMworld 2018 Executive Wrap-up: WorkSpace One, vSphere, Cloud Management appeared first on Petri.

Continue reading VMworld 2018 Executive Wrap-up: WorkSpace One, vSphere, Cloud Management

VMworld 2018 Day 2 – Digital Transformation Stories and a Guest Appearance by Malala Yousafzai

he VMworld 2018 Day 2 keynote took a different turn than the previous day but was still packed with updates and announcements.

The post VMworld 2018 Day 2 – Digital Transformation Stories and a Guest Appearance by Malala Yousafzai appeared first on Petri.

Continue reading VMworld 2018 Day 2 – Digital Transformation Stories and a Guest Appearance by Malala Yousafzai

VMworld 2018 Day 1 Keynote – VMware Bridges the Hybrid Cloud and Multi Cloud Management

VMWorld is happening this week and if you missed the action from day one, here’s a brief summary of everything that was announced.

The post VMworld 2018 Day 1 Keynote – VMware Bridges the Hybrid Cloud and Multi Cloud Management appeared first on Petri.

Continue reading VMworld 2018 Day 1 Keynote – VMware Bridges the Hybrid Cloud and Multi Cloud Management

Incorporating sensitive asset data into your vulnerability and compliance program

In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the importance of incorporating inaccessible or sensitive asset data into your overall vulnerability and compliance prog… Continue reading Incorporating sensitive asset data into your vulnerability and compliance program