Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1133)
  • Article (286)
  • News (72)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 143 144 145 146 147 148 149 150

14%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
of vulnerabilities, so they can be analyzed and continuously monitored. Gartner [3] includes Armis, Axonius, Balbix, JupiterOne, Lansweeper, OctoXLabs, runZero, and ThreatAware in its list of CAASM providers
14%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
information, such as home drives or Windows Local Administrator Password Solution (LAPS). According to MITRE ATT&CK [3], attackers derive their techniques from these three AD functions and deploy them
14%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
after the scanning process. (3) They are designed to discover known vulnerabilities only. They cannot identify other security threats, such as those related to physical, operational, or procedural issues
14%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
hope to orient you in the correct direction for deploying a log analysis capability. Splunk Although I'm a big supporter of open source, Splunk [3], a commercial product, is probably the gold standard
14%
Nothing works without a profile
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © abidal, 123RF.com
the requirements for environments with folder redirection [3]. Starting Points Basically, UEM tools have two ways to enable backing up and restoring configuration data. With the "external method," the UEM has

« Previous 1 ... 143 144 145 146 147 148 149 150

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice