Best of CybersecurityMarch 2025

  1. 1
    Article
    Avatar of jeffgeerlingJeff Geerling·1y

    I won't connect my dishwasher to your stupid cloud

    The author bought a Bosch 500 series dishwasher, only to discover that certain features like the rinse cycle, delayed start, and eco mode require using the Home Connect app and connecting the appliance to WiFi. This raises concerns about planned obsolescence, security risks, and the forced reliance on cloud services. The author argues for locally accessible controls on IoT devices, with cloud functionality as an optional add-on.

  2. 2
    Video
    Avatar of tiffintechTiff In Tech·1y

    The Top 10 Tech Skills That Will Remain In-Demand for 2026

    The tech industry is evolving rapidly, with new roles constantly emerging while existing ones change. The post identifies the top 10 tech skills that will be crucial by 2026. These include Gen AI development, advanced cybersecurity and ethical hacking, cloud-native application development, big data, blockchain technology, edge computing, immersive technology (AR/VR), quantum algorithms development, DevSecOps, and sustainability and green technology. Acquiring these skills can make a significant difference in staying competitive in the job market.

  3. 3
    Article
    Avatar of javarevisitedJavarevisited·1y

    Top 5 Udemy Courses to Learn DevSecOps in 2025

    Discover the top 5 Udemy courses for experienced developers to learn DevSecOps in 2025. These courses cover everything from DevSecOps fundamentals to advanced security automation practices and tools like Docker, Jenkins, Ansible, Terraform, and Kubernetes. Ideal for developers, DevOps engineers, cloud architects, and security professionals, these courses will help you integrate security into your CI/CD pipelines and build secure applications.

  4. 4
    Article
    Avatar of opensourcesquadOpen Source·1y

    🚀Exploring authentik: An Open-Source Identity Provider & SSO Solution

    authentik is an open-source Identity Provider and Single Sign-On solution that supports OAuth2, SAML, LDAP, and SCIM. It offers user management, customizable authentication flows, and both admin and user dashboards. It integrates seamlessly into existing infrastructures without significant changes.