Articles

Lead Image © amasterpics123, 123RF.com

Lead Image © amasterpics123, 123RF.com

Identity Governance regulates access control in Azure AD

Azure Active Directory Identity Governance brings security processes to organizations with users who access resources or collaborate with partners in the cloud.
Photo by James Pond on Unsplash

Photo by James Pond on Unsplash

Mesh Service for OSI Layers 2 and 3

In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what makes it different.
Lead Image © Petr Vaclavek, 123RF.com

Lead Image © Petr Vaclavek, 123RF.com

Secure your data channel with stunnel

Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.
Lead Image © Eric Gevaert, 123RF.com

Lead Image © Eric Gevaert, 123RF.com

Serverless run times with custom Bash AWS Lambda layers

A piece of old-meets-new functionality lets you run Bash scripts in an AWS Lambda layer.
Lead Image © nattapol sritongcom, 123RF.com

Lead Image © nattapol sritongcom, 123RF.com

Cloud-native application bundles for easy container deployment

Cloud-native application bundles are an easy option for distributing applications in a microservice architecture.
Lead Image © reddogs, 123RF.com

Lead Image © reddogs, 123RF.com

Use PowerShell to manage Exchange Online

Exchange Online in Office 365 can be managed just like its local counterpart with similar, sometimes identical, PowerShell cmdlets.
Lead Image © Jakub Jirsak, 123RF.com

Lead Image © Jakub Jirsak, 123RF.com

Regular expression security

Regular expressions are invaluable for checking user input, but a vulnerability could make them ripe for exploitation.
Lead Image © dimaberkut, 123RF.com

Lead Image © dimaberkut, 123RF.com

Reducing your attack surface

Windows Defender Application Control protects systems against threats that traditional virus scanners and signature-based mechanisms cannot detect by restricting applications in the user context and reducing the code allowed in the system kernel.
Lead Image © J¸rgen Acker, Photocase.com

Lead Image © J¸rgen Acker, Photocase.com

Setting up DevOps Orchestration Platform

DevOps Orchestration Platform open source framework was developed in Golang and can be used to bootstrap an IT infrastructure dynamically or import details of an existing IT infrastructure locally on VirtualBox or in the Cloud.
Lead Image © sarah maher, 123RF.com

Lead Image © sarah maher, 123RF.com

OPNids: Suricata with built-in machine learning

Does OPNids combine the Suricata IDS with machine learning to detect attack threats automatically, as advertised?