TypeScript is bringing 2 incredible new features to the table, stay on top of what’s coming!TypeScript 4.7This upcoming TypeScript version will bring a lot of new features and improvements to the language, but there are 2 in particular that I found especially interesting:1- Instatiation Expressions2- extends Constraints on infer Type VariablesNew features valueIf you are anything like me and enjoy creating complex type definitions that provide great levels of Developer Experience to you and your co-workers, then you should absolutely be on top of these new features, as they will ease the way you write those type definitions, by A LOT.Reduce your types verbosity;For anyone that has written more than a handful of generic functions, this new feature is probably something that could have saved you from writing “crappy” JS workarounds to get some types going.Instantiation Expressions will allow us to get a generic type, without the “instantiation” part 🤯type Dog = {name: stringisGoodBoy: boolean;}type Cat = {name: string}function getBigPet(pet: T){return {…pet, big: true}}// 1- Need to have a typed param to pass 👎const dog: Dog = {name: “Jake”, isGoodBoy: true}// 2- Need to create an arrow function 👎const getBigDog = () => getBigPet(dog);Before this upcoming version, there was really no way to leverage a generic function’s type, which led many of us to create workarounds by writing unnecessary JS code. ❌type Dog = {name: stringisGoodBoy: boolean;}type Cat = {name: string}function getBigPet(pet: T){return {…pet, big: true}}// Can “instantiate” on the fly ✅const getBigDog = getBigPet;// No need to bring in any extra types ✅type BigCat = ReturnType>So, what Instantiation Expressions bring to the table, is the simplicity with which one can retrieve a generic function’s type without any sort of workarounds or creating any extra JS code.PROSNo need to write JS code just for the sake of typing;extends Constraints on infer Type VariablesThis new feature is something that will help anyone to write way less verbose types when depending on inferred type constraints.It basically acts as an early return statement that we (developers), many times use in languages like JavaScript to immediately move away to the “false” logical path, when some conditional is met.// A type that returns the First and Last elements of the Number type // 😔😔😔 This feels overwhelming…type FirstAndLastNumber = T extends [infer Head,…any,infer Tail]? Head extends number? Tail extends number? [Head, Tail]: never: never: never;Before this upcoming feature, there was no way to do an “early check” on the inferred types, and because of that, we ended up creating very verbose and “scary” types. ❌After 4.7// The “same” type as before 🤯🤯🤯type FirstAndLastNumber = T extends [// 1- Add the extends constraint hereinfer Head extends number,…any,// 2- Add the extends constraint hereinfer Tail extends number] ? [Head, Tail]: never;extends Constraints on infer Type Variables really simplifies the process of defining types that rely on inferred type variables – more than a syntax change, this feature really takes the mental model of creating types one step closer to the one we use in “real programming”.PROS1- Cleaner and less verbose types;2- Lowers the complexity barrier for others to touch this otherwise “monstrosity” type;3- TypeScript compiler will be faster because it can return earlier;ConclusionBy taking advantage of TypeScript’s 4.7 version new features, you will be able to lower the complexity of type definitions by a lot, making it way easier for anyone to understand and even develop on top of those types.P.S. You can already try these new features in the TypeScript PlaygroundMake sure to follow me on twitter if you want to read about TypeScript best practices or just web development in general!TypeScript is bringing 2 incredible new features to the table, stay on top of what’s coming!TypeScript 4.7This upcoming TypeScript version will bring a lot of new features and improvements to the language, but there are 2 in particular that I found especially interesting:1- Instatiation Expressions2- extends Constraints on infer Type VariablesNew features valueIf you are anything like me and enjoy creating complex type definitions that provide great levels of Developer Experience to you and your co-workers, then you should absolutely be on top of these new features, as they will ease the way you write those type definitions, by A LOT.Reduce your types verbosity;For anyone that has written more than a handful of generic functions, this new feature is probably something that could have saved you from writing “crappy” JS workarounds to get some types going.Instantiation Expressions will allow us to get a generic type, without the “instantiation” part 🤯type Dog = {name: stringisGoodBoy: boolean;}type Cat = {name: string}function getBigPet(pet: T){return {…pet, big: true}}// 1- Need to have a typed param to pass 👎const dog: Dog = {name: “Jake”, isGoodBoy: true}// 2- Need to create an arrow function 👎const getBigDog = () => getBigPet(dog);Before this upcoming version, there was really no way to leverage a generic function’s type, which led many of us to create workarounds by writing unnecessary JS code. ❌type Dog = {name: stringisGoodBoy: boolean;}type Cat = {name: string}function getBigPet(pet: T){return {…pet, big: true}}// Can “instantiate” on the fly ✅const getBigDog = getBigPet;// No need to bring in any extra types ✅type BigCat = ReturnType>So, what Instantiation Expressions bring to the table, is the simplicity with which one can retrieve a generic function’s type without any sort of workarounds or creating any extra JS code.PROSNo need to write JS code just for the sake of typing;extends Constraints on infer Type VariablesThis new feature is something that will help anyone to write way less verbose types when depending on inferred type constraints.It basically acts as an early return statement that we (developers), many times use in languages like JavaScript to immediately move away to the “false” logical path, when some conditional is met.// A type that returns the First and Last elements of the Number type // 😔😔😔 This feels overwhelming…type FirstAndLastNumber = T extends [infer Head,…any,infer Tail]? Head extends number? Tail extends number? [Head, Tail]: never: never: never;Before this upcoming feature, there was no way to do an “early check” on the inferred types, and because of that, we ended up creating very verbose and “scary” types. ❌After 4.7// The “same” type as before 🤯🤯🤯type FirstAndLastNumber = T extends [// 1- Add the extends constraint hereinfer Head extends number,…any,// 2- Add the extends constraint hereinfer Tail extends number] ? [Head, Tail]: never;extends Constraints on infer Type Variables really simplifies the process of defining types that rely on inferred type variables – more than a syntax change, this feature really takes the mental model of creating types one step closer to the one we use in “real programming”.PROS1- Cleaner and less verbose types;2- Lowers the complexity barrier for others to touch this otherwise “monstrosity” type;3- TypeScript compiler will be faster because it can return earlier;ConclusionBy taking advantage of TypeScript’s 4.7 version new features, you will be able to lower the complexity of type definitions by a lot, making it way easier for anyone to understand and even develop on top of those types.P.S. You can already try these new features in the TypeScript PlaygroundMake sure to follow me on twitter if you want to read about TypeScript best practices or just web development in general!

SSH

PRESS RELEASE: Cinia and SSH expand their cooperation in delivering cybersecurity solutionsCinia and SSH have jointly agreed to develop and offer their Finnish and international customers advanced cybersecurity solutions. In cooperation with SSH, Cinia will provide new services for the processing and transfer of sensitive data and for ensuring access management and control, especially inContinue reading “SSH”

Veteran Cybersecurity Expert, Michael Orozco Joins MorganFranklin ConsultingAddition of Accomplished Industry Leader Continues to Strengthen Cybersecurity Practice to Help Clients Navigate Emerging ThreatsWASHINGTON, May 25, 2022–(BUSINESS WIRE)–MorganFranklin Consulting, a leading finance, technology, and cybersecurity advisory and management firm that specializes in solving complex transformational challenges for its clients, today announced the addition of cybersecurity expert Michael Orozco to serve as a Managing Director and Advisory Services Leader in its cybersecurity practice.”We are thrilled to have Michael join the MorganFranklin team and harness his expertise to help our clients build and deploy mission critical cybersecurity initiatives,” said Keith Hollender, a partner in MorganFranklin’s cybersecurity practice. “As cyber criminals and nation-states launch ever more sophisticated attacks and technology rapidly evolves, cybersecurity must be a top priority for all organizations. Michael will help our clients address the growing challenges that are spurred on by these changes.”Michael brings more than two decades of experience in cyber defense, nation-state attacks, cyber risk mitigation, financial crime, incident response, and regulatory compliance. He has worked extensively across the United States, Eastern and Western Europe, Latin America and speaks fluent Spanish, intermediate French and Russian, and elementary Korean. With a background in the financial services, life sciences and pharmaceutical industries, Michael is also an expert at navigating emerging challenges driven by digital transformation, operations modernization, and blockchain technology. He has extensive experience advising boards of directors as well as through in-depth technical architecture work. He is also a hands-on capable subject matter expert having earned his CISA, CDPSE, CGEIT, CRISC, PMP, and AWS Certified Solution Architect Professional credentials.”I’m excited to use my unique expertise to help MorganFranklin continue to accelerate its growth as a premier consultancy,” said Michael Orozco. “This company is dedicated to helping solve the most pressing cybersecurity challenges for clients and to prepare them for emerging threats on the horizon. That is a mission I am proud to be a part of.”Prior to MorganFranklin, Michael was a partner leading cybersecurity, risk, and resilience efforts for KPMG. He has also held global leadership positions at Accenture and other consulting firms, where he built and led global teams focused on mission critical security programs. In addition, Michael has received U.S. Congressional awards from the U.S. Senate, U.S. House of Representatives, and citations from the State of New York and the Borough of Brooklyn for his national cybersecurity efforts.MorganFranklin’s cybersecurity practice provides end-to-end client services that include program strategy governance, risk and compliance; identity and access management; cybersecurity operations; incident response; business and technology resilience; risk intelligence; and a complete portfolio of managed security services.MorganFranklin’s cybersecurity practice leaders, including Michael Orozco, will be onsite at RSA Conference in San Francisco June 6-9, 2022. To schedule a personalized discussion, email: CyberBD@morganfranklin.com. For more information visit: www.morganfranklin.com/cybersecurityMorganFranklin Consulting is a management advisory firm that works with leading businesses to address critical finance, technology, cybersecurity and business objectives. The firm’s areas of expertise also include on-demand technical accounting, financial reporting, assistance with IPO, M&A, and SPAC transactions, finance transformation, risk advisory, supply chain services, and the implementation of enterprise & cloud applications including NetSuite, Microsoft ERP, OneStream, and more. MorganFranklin is headquartered in the Washington D.C. area with regional offices in New York, Philadelphia, Atlanta, Raleigh, Charlotte, Nashville, Dallas, Los Angeles, and San Francisco. The firm supports clients across the globe. For more information visit: www.morganfranklin.comAbout VacoVaco delivers critical talent solutions to clients by providing consulting, project resources, executive search, direct hire and strategic staffing solutions with expertise in numerous areas including accounting and finance, technology and operations. In addition to Vaco, the family of brands includes MorganFranklin Consulting, Vaco’s methodology-driven global consulting platform; Pivot Point Consulting, a best in KLAS healthcare IT solutions provider; and Focus Search Partners, a retained executive search practice. Since its founding in 2002, Vaco has grown to serve more than 12,000 clients across the globe with 10,000 employees. Vaco has been named to Inc. magazine’s list of the fastest-growing private companies for the past 15 years and was named to Forbes’ 2018, 2019, 2020 & 2021 lists of America’s Best Recruiting Firms. For more information on Vaco visit: www.vaco.comView source version on businesswire.com: https://www.businesswire.com/news/home/20220525005349/en/

Cybersecurity

Mastercard Enhances Cybersecurity Consulting Practice with Cyber Front Threat Simulation PlatformWith cybercrime expected to cost $10.5 trillion annually by 2025, innovating cybersecurity remains critical across industries “facing rapid digitization.”The tool will “help businesses and governments enhance their cybersecurity operational resilience as part of Mastercard’s growing Cybersecurity & Risk consulting practice.”Cyber Front, an always-on platform, “helpsContinue reading “Cybersecurity”

Security Innovation Donates Cybersecurity Training Platform to Shaw UniversityPhilanthropic Partnership enriches University’s Computer Science degree with Cyber Operations Concentration.WILMINGTON, Mass., May 25, 2022 (GLOBE NEWSWIRE) — Security Innovation, a pioneer in software security assessment and training, announced today a partnership with Shaw University, a historically black college/university (HBCU). The software security training platform features an extensive catalog of online courses, hands-on labs, and authentic cyber ranges. The partnership supports Shaw’s commitment to addressing the cybersecurity job shortage, which presently stands at nearly 3 million unfilled positions globally. The Shaw University Center for Cybersecurity Education and Research also will help improve the lack of diversity in the industry by creating new cybersecurity professionals from under-represented demographic populations.Shaw students will get full access to CMD+CTRL Base Camp, the same training platform used by Security Innovation’s enterprise customers, including some of the most recognizable global brands. Students will be trained on the most pressing security issues facing our increasingly software- and cloud-dependent world.Information Security AnalystCyber Threat HunterSecurity Operations AnalystThe learning methodology used in Security Innovation’s training platform is similar to what higher education institutions have used for decades to build skills in a timely, effective way: learn, practice, and master. Shaw will integrate these products as an integral part of classroom education, labs, and capstone projects for its new cybersecurity programs. “This partnership with Security Innovation is a significant step toward preparing our students to be leaders in the cybersecurity industry,” said Dr. Paulette Dillard, President of Shaw University. “By collaborating with a leader in security training, our students will have access to state-of-the-art software, training, and technology, which is crucial for workplace readiness on Day 1.”“As a university spin-off itself, Security Innovation recognizes the value of educating students on cybersecurity so they graduate with skills that are in demand,” said Ed Adams, CEO of Security Innovation. “This partnership builds on our decade-long commitment to diversify the cyber security industry so we are better able to defend critical infrastructure. There are good social, economic, and geopolitical reasons for launching this partnership with Shaw University.”About Shaw UniversityShaw University, located in Raleigh, North Carolina, is the first historically Black institution of higher education founded in North Carolina and is among the oldest in the nation. The University was founded in 1865 by Henry Martin Tupper. Dr. Paulette Dillard currently serves as the University’s 18th President. For more information, visit www.shawu.edu.About Security InnovationSecurity Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on the company’s assessment and training solutions to secure software wherever it runs. Recognized 6x on the Gartner Magic Quadrant for computer-based security training, the company’s flagship product CMD+CTRL Base Camp combines role-based courses with hands-on cyber ranges to build skills that stick. For more information, visit securityinnovation.com or connect on LinkedIn or Twitter.About CMD+CTRL Base Camp Training PlatformBase Camp is the industry’s most dynamic and integrated solution for building software security skills. Accessible from a single portal, learners can follow individualized Learning Journeys, which can be created for any role or experience level across the entire software development lifecycle. These natural learning progressions enable users to learn security concepts with courses, practice those skills in hands-on labs, and finally master those skills through competition in our Cyber Range. With over 3.5 million users, Base Camp helps all software security stakeholders address the risk of today’s tech stacks – flawed design, defenseless code, expanded attack surface, and misconfigured deployments.Media ContactMaureen RobinsonMarketing Directormrobinson@securityinnovation.com978.390.3299

inifinte tanks to God! A.I.event at uyo was successful. we thank you for being part of this wonderful event. Big thanks to all sponsors, tech team’s and members of DSN for supporting us as we contribute to the A.I. community at uyo akwa ibom state. we treasure your contribution and time with us! Big tanks to @kvng-odesy,, for full support. i want to publicly appreciate my team, we’ve been working tirelessly to the contributions to our building community, as always, thanks. we look forward to seeing you next time, future collaborations from your side🤝

Tailoring the Cybersecurity Message for Small Orgs, ResidentsCybersecurity guidance needs to be designed so small organizations can easily identify next steps to take, and awareness campaigns should put practices into language layfolk can understand, experts say.May 24, 2022 by Jule Pattison-GordonCybersecurity takes a whole-of-society approach, and ensuring that everyone is part of the journey relies on having a communication strategy that meets small organizations and everyday residents where they’re at, said speakers at a recent Institute for Security and Technology (IST) special event on ransomware.PRACTICAL PRIORITIESThere’s plenty of cybersecurity advice swirling about — perhaps too much. Organizations can get easily overwhelmed by all the different advice and regulatory frameworks, leaving them at a loss as to where to start their improvement efforts, said Phyllis Lee, senior director of Controls at the Center for Internet Security (CIS).There’s an element of realism and practicality that needs to be part of these conversations:“In the real world, we know that almost no organizations are actually patching every single vulnerability everywhere in the environment,” said Eric Goldstein, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA).Players in the space therefore need to help entities with their priorities. CISA aims to do this in part by creating its catalog of Known Exploited Vulnerabilities, which lists out which — out of all the vulnerabilities out there — are the ones its actually seeing malicious actors take advantage of, so organizations don’t get lost trying to tackle everything.CIS also aims to help organizations identify the cybersecurity controls that will give them the most bang for their buck. Last October, it released a new guidance called Implementation Group 1 (IG1). This guideline outlines core cyber hygiene steps that are low-cost to implement but still make a difference against many of the techniques used in ransomware attacks and other top threats. Organizations with more resources and greater need for security can step it up by adopting additional steps outlined in its Implementation Groups 2 and 3.And basic steps can carry a lot of weight.“Most of the time, [the bad guys] are using really basic tools and techniques that have been used over and over and over again,” said Cyber Threat Alliance President and CEO Michael Daniel.He and Lee both said it’s important to remind organizations that any steps they take to improve their cyber defenses matter and not to feel like it’s hopeless if they can’t adopt all the recommendations in one go.COMMUNICATION OUTSIDE THE CYBER BUBBLEThe cybersecurity community also needs to ensure that it’s reaching audiences beyond those likely to turn up to a cybersecurity conference, said Goldstein. This is an issue that impacts everyone and getting all ears may mean bringing cybersecurity conversations to non-cyber industry conferences as well as spreading word through local media, he said.Daniel also recommended reaching out to organizations that particular audiences already work with, such as chambers of commerce to reach small businesses or bar associations to reach legal groups.Government agencies also want to improve how they talk to residents, who can reduce risks if they know how to stay safe.“One of the most important things we can do is help the American people build resilience,” said CISA Director Jen Easterly.When trying to connect with layfolk, it’s essential to break out of using buzzwords and jargon to instead offer clear, easy-to-follow explanations, Easterly said.“If you’re speaking nerd-speak to the American people — for example, ‘multifactor authentication,’ — their eyes glaze over,” Easterly said.There’s a simpler, more effective way of getting across the same idea, she said: “Really, at the end of the day it’s ‘more than a password.’”SECURITY BY DESIGN?Asking users to adopt more secure behaviors is only part of the challenge. National Cyber Director Chris Inglis has previously urged those who create technology to design their offerings to be more secure and shift more of security responsibility and risk off of the small entities and individuals using the tools and onto their own shoulders.Palo Alto Networks Vice President of Public Sector John Davis saw cybersecurity as an area requiring new efforts from both end users and those who provide them tools. Security practitioners and end users may fail to realize just how important it is to follow low-cost cybersecurity basics like changing passwords on a recurring basis, regularly updating systems and adopting multifactor authentication, he said, and suggested a national awareness campaign could be part of the effort to change this.But Davis also said that technology companies have work to do, too, because the tools they offer can be hard to use well. Users today are working with a vast array of technologies, and often need to juggle a variety of security solutions that each protect one aspect of the environment and which aren’t designed to integrate with each other.“Cybersecurity technologies are becoming more difficult to understand and harder to use,” Davis said.Tech firms that design their offerings with customers’ safety in mind can blunt the impact of insecure user habits. Many cyber attackers make use of leaked, stolen or easy-to-crack passwords, and Easterly praised efforts by members of the FIDO Alliance to make passwordless login methods. That organization aims to develop and promote alternate methods of authentication.“We want to move in that direction, so we make it easy on consumers to just be able to seamlessly protect themselves,” she said.

Design a site like this with WordPress.com
Get started