Five Blogs – 1 August 2022

The (best) five blogs we can read today. Check them out.

Questionable Advice: Is There A Path Back From Cto To Engineer?
Written by: Charity Majors

Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself
Written by: Microsoft Threat Intelligence Center

What is Kerberos Authentication, How it Works, and its Advantages?
Written by: Gurubaran S

Enjoy Testing
Written by: James Thomas

Change Logs: The Treasure Maps of Committed Code
Written by: Melissa Eaden

Quote of the day:
“This is how bad stories end. But it’s also how the best stories begin.” -Iain Thomas

You can follow this page on Twitter


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: