TNS
VOXPOP
Which agile methodology should junior developers learn?
Agile methodology breaks projects into sprints, emphasizing continuous collaboration and improvement.
Scrum
0%
Kanban
0%
Scrumban (a combination of Scrum and Kanban)
0%
Extreme Programming (XP)
0%
Other methodology
0%
Bah, Waterfall was good enough for my elders, it is good enough for me
0%
Junior devs shouldn’t think about development methodologies.
0%
STORIES BY Lucian Constantin — PAGE 1
What You Need to Know About the RunC Container Escape Vulnerability
Critical Vulnerability Allows Kubernetes Node Hacking
Attackers Up Their Game with Latest npm Package Compromise
Poorly Configured CI/CD Systems Can Be a Backdoor into Your Infrastructure
Two Serious Vulnerabilities Hit the Linux Kernel
Poor Password Hygiene Enabled ESLint Supply-Chain Attack on Npm
Over 20,000 Container Management Dashboards Are Exposed on the Internet
Repository Attacks Continue with Backdoored Docker Images
Npm Attackers Sneak a Backdoor into Node.js Deployments through Dependencies
Here’s Why You Should Secure Your Etcd Deployment
Kubernetes Races to Fix Regressions Introduced by Recent Security Patches
How a Vulnerability Disclosure Policy Keeps Your Security Flaws off the Dark Web
With Unstable Meltdown Patches You Might Want to Consider Detection Instead
What You Need to Know About the Meltdown and Spectre CPU Flaws
Node.js Fixes High-Risk Data Confidentiality Flaw
TNS Guide: How to Manage Passwords and Keep Your Online Accounts Secure
Node.js Update Fixes a Serious Remote Denial-of-Service Flaw
Jenkins Security Updates Fix Three High-Risk Vulnerabilities
Security Alert: Patch Dnsmasq on Your Linux Servers, Kubernetes and Networking Devices
Apache Web Server Bug Can Allow Attackers to Dip into Memory Data
Python Package Repository Struggles to Deal with Typosquatting
Equifax Data Breach Shows the Perils of Not Patching in a Timely Manner
Here’s Why You Should Have a CAA DNS Record for Your HTTPS Website
Critical Vulnerability in Apache Struts Puts Thousands of Web Applications at Risk
Want a Docker Hacking Challenge? Try This Vulnerable VM
Security Researchers Lose Faith in HTTP Public Key Pinning
Xen Hypervisor Patched for Privilege Escalation and Information Leak Flaws
PostgreSQL Gets a Fix for a Passwordless Authentication Flaw