• MDM - DevOps and IT Operations

    Deploying MDM Application (EBX) on Docker

    Chapter 1: Introduction In the recent past we have experienced many customers wants to containerize the deployment process.  Container deployment is a method for quickly building and releasing complex applications. Docker container deployment is a popular technology that gives developers the ability to construct application environments with speed at scale. What is Container Deployment? Container deployment is the action of putting containers to use. The deployment of containers uses management software that simplifies the launch and updates of applications. Container deployment provides fast access to environments and speeds up development because secure containers can be quickly downloaded and put to use.…

  • Network Security - Network Vulnerabilities

    Reflecting on the WannaCry Ransomware Attack: The World Held Hostage

    As I sit here on Christmas Eve, reflecting on the past year, I find myself drawn to an event that profoundly shifted my perspective on technology and its vulnerabilities. Earlier this year, the WannaCry ransomware attack emerged as a stark reminder of the fragility of our interconnected systems. This incident not only disrupted critical services worldwide but also compelled me to delve deeper into the realms of network vulnerability and security. In this blog, I aim to revisit the WannaCry attack, its widespread impact, the response that curtailed its spread, and the enduring lessons it imparted about our digital world’s…

  • Network Vulnerabilities - Network Security

    NotPetya: Unmasking the World’s Most Devastating Cyberattack

    As I reflect on the past year, another cyber incident stands out for its unprecedented scale and impact: the NotPetya attack of June 2017. This event not only disrupted global operations across various sectors but also underscored the critical importance of robust cybersecurity measures. In this blog, I will explore the origins of NotPetya, its widespread ramifications, the response strategies employed, and the vital lessons learned from this cyber catastrophe. The NotPetya Attack: A Global Disruption On June 27, 2017, a malicious software strain, initially perceived as ransomware and dubbed NotPetya, began rapidly infecting computer systems worldwide. Unlike typical ransomware,…