Stephan Venter

Why your servers can still...
It’s been about a decade since the discovery of Heartbleed,...
Identify, mitigate & prevent buffer...
Buffer overflow vulnerabilities are still a common route by which...
Reduced Time to Exploit Is...
We need an opportunity to achieve our cybersecurity goals. The...
Remote code execution attack: what...
Cybercriminals use a range of strategies to target vulnerable systems...
Bad Reasons to Update Your...
Freshen up with something new and improved – if it’s...
The Risks of Running an...
It’s impossible to avoid change in technology – by definition,...
State Actors May Be Targeting...
Infrastructure is at the core of any business – whether...
Which Matters More: Perimeter Security...
If you have limited resources, what should you do first:...
What is Proxmox VE –...
Proxmox VE is an open-source platform for server virtualization that...
Stack unwinding in AArch64 processors:...
KernelCare Enterprise’s Linux kernel live patching software has supported ARMv8...
Understanding, Using, and Patching...
No matter which tech stack you depend on, you can...
Why You Should Include Live...
Managed services providers (MSPs) face several challenges that can affect...