Skip Navigation
The Closer You Get, The Less You Can Hold It.
  • Typically you put your independent variable on the X axis and the dependent on the Y. It now looks as if the more urgently you need to go, the closer people get to toilets (which, while not linear, will probably also be correct)

  • Deleted
    What habits do you have to protect your data privacy?
  • Password rotation isn't necessary anymore according to NIST. Use long/strong unique passwords combined with MFA.

    Furthermore, public wifi risk is overblown. As long as you ensure encrypted communication, you're good.

    This has no direct effect on privacy by the way.

    Source: I'm an information Security manager.

  • Virtualized Security Best Practices to Protect Data and Applications
  • The 1990s just called. They want their article back.

    No one is still running a lot of bare metal. Everything is virtualized at the bare minimum, or containerized or Serverless code.

    Furthermore the article doesn't really teach you anything new except for the existence of the hypervisor layer. Threats and controls are mostly the same between physical and virtualized.

    :Edit: just saw you wrote this article. Sorry for the harsh criticism, but I stand by it. Try to be more accurate with your threat and control assessments or write about more niche technology.

  • EarthPorn @lemmy.ml Cow_says_moo @lemmy.world
    [OC] Gasadalur, Faroe Islands, 4032 x 3024

    An island with a cloud hat.

    2
    Puffin nesting by a waterfall

    Taken today at Gasadalur, Faroe islands.

    6
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CO
    Cow_says_moo @lemmy.world
    Posts 6
    Comments 32