January 26, 2022
In 2020, over 1,100 data breaches were reported, affecting nearly 300 million individuals. Designing and maintaining the network infrastructure of an organization is a vital part of security and is needed now more than ever before.
January 13, 2022
Machine learning and AI applications still most often fail because user design is not done well. This blog lists considerations for the human centered design of AI technologies in the augmentation of human performance.
January 5, 2022
A brief metaphorical monologue cautioning about the easy security pitfall that is Security via Obscurity. This strategy employs secrecy as the primary method to secure an asset- whether this is liquid wealth, documents, or data on a server somewhere.
December 28, 2021
There has been a recent increase in the number of technological devices that use biometric scanners as the primary form of authentication on their devices. This blog explores whether remembering passwords is now a thing of the past.
December 22, 2021
Companies from all industries have invested in the development of UX teams, realizing the advantage of a human-centered design process. However, one thing that remains is the disconnect between stakeholders and users throughout the product building process.
November 22, 2021
Leveraging the gitops methodology makes it easy to enable developers to deploy applications onto our K8s clusters. Each cluster has a repo for the app of apps where we could add a new application manifest and it would be deployed through ArgoCD.
November 17, 2021
Everything we do online leaves a digital breadcrumb that if someone were to follow can be used against us. Staying secure online sometimes requires thinking like the adversary and trying to compromise yourself to see how susceptible you really are.
November 9, 2021
We are all responsible for our own network hardening and security. This blog post is about how to harden your network and push Advanced Persistent Threats (APTs) efforts away.
October 30, 2021
The extensive usage of mobile devices in today’s work environment has led to a significant rise in the risk for data theft. Securing mobile devices requires a multi-layered approach and investment in enterprise solutions.
October 27, 2021
October is Cybersecurity Awareness Month which is why we want to utilize this month to share a few recommendations on how to remain updated with security topics and threat information.
October 19, 2021
Phishing is one of the most common forms of cyber attacks and is still a danger to users on the internet. This blog goes over what phishing is and some of the best ways to protect oneself from such attacks.
September 28, 2021
When your application needs to handle large data you are forced to think critically about your approach. Therefore do not limit your system by neglecting a sound approach when dealing with large data.
September 22, 2021
The Softrams team is proud to share the advancement achieved on the DBidS program, which includes the utilization of modern technology such as designing infrastructure for autoscaling and enhanced security.
September 14, 2021
The best software lets users accomplish their goal without getting in the way. Build quality into your process to launch better produces and empower your users.
September 7, 2021
Explore ClickJacking; an interface-based attack where a user is tricked into clicking on a website or application in order to obtain user information. Learn more the different ways to protect yourself from such malicious attacks.
August 26, 2021
An algorithm known as "Levenshtein distance" from the 1960s is the foundation for modern auto-correct and search routines. Softrams’ App Foundry recently explored methodological aspects of using such algorithms for matching records based on text fields.
August 23, 2021
Never trust verification websites asking for your password to see if it's included in a "breach." Always ensure you are securing your personal information and passwords.
August 19, 2021
Inc. magazine revealed that Softrams is No. 1018 on its annual Inc. 5000 list, the most prestigious ranking of the nation’s fastest-growing private companies. Among the 5,000, the average median three-year growth rate soared to 543 percent.
August 16, 2021
Malware is any type of malicious activity that can cause harm to a system. Malware is an umbrella term that takes many forms such as a virus, worm, trojan, spyware, ransomware and so on.
August 11, 2021
IaC is a key DevOps practice and is used concurrently with continuous delivery. This blog covers the top three tools, Terraform, CloudFormation, and Ansible that fall under IaC for AWS.