Danny Gershman

By

As organizations increasingly rely on edge computing to process data closer to where it’s generated, ensuring high availability and reliability becomes crucial for mission-critical applications. In this article, we’ll explore how Radius Method leverages cutting-edge technologies like Zarf, Big Bang, and Iron Bank to deploy edge-ready, highly available Kubernetes clusters. Radius Method built a new...
Radius Method is announcing a new open-source Zarf Init Package specifically designed for using Iron Bank images to deploy a cluster with Big Bang. By integrating with Iron Bank’s trusted and certified images, organizations can rest assured that their software deployments are built on a foundation of utmost security. This further refines the security posture...
Independent Verification and Validation (IV&V) has long been a critical component of ensuring software quality and compliance. In today’s fast-paced digital landscape, the traditional Waterfall approach may no longer suffice. In the ever-evolving software industry, quick and continuous feedback is vital. Waterfall methodologies, characterized by lengthy phases, often struggle to provide timely insights into potential...
In an era where cybersecurity threats loom large, the concept of “Edge First Development” has emerged as a paramount strategy for safeguarding critical infrastructure and data. This approach prioritizes security by minimizing network connections to external repositories and services, thereby reducing vulnerabilities. In this article, we will explore the concept of Edge First Development in...
In today’s cybersecurity landscape, where threats evolve relentlessly, organizations cannot rely solely on tracking known vulnerabilities and Common Vulnerabilities and Exposures (CVEs) to safeguard their digital assets. While CVE tracking is essential, it’s just the tip of the iceberg. This article delves into why depending solely on CVEs is insufficient for defending against attacks and...
POC: https://github.com/radiusmethod/lortnoc In an age where digital interconnectedness dominates, supply chain risks have taken on a new form – one that lurks within the lines of code itself. This article delves into a compelling proof of concept known as “Lortnoc,” which has demonstrated the potential supply chain vulnerabilities stemming from code obfuscation. The intricate nature...
Source Code: https://github.com/radiusmethod/knock In the world of cybersecurity, the constant battle between attackers and defenders has led to the evolution of innovative techniques to safeguard network infrastructures. Among these, “Port Knocking” has emerged as a unique and increasingly popular method for enhancing network security. Originally conceived as an obscure concept, port knocking has experienced a...
1 2