Advanced search


Negotiating Hurdles  

Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.

Dinos in the Matrix  

The open source tool Velociraptor is at the heart of a solution that automatically detects cyber threats in industrial environments, offering a defensive strategy and protecting critical infrastructures.

The Early Bird  

The DefectDojo vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.

Sharing the Load  

In the Azure cloud, Microsoft offers the Azure Application Gateway managed service as a Layer 7 load balancer that needs virtually no internal resources to set up and operate.

Escape Room  

Implement a good, robust defense with an in-depth strategy of applying multiple layers of security to all components, including the human factor.

Contact  

We look at various approaches to RFID asset tracking, provide an understanding of the technologies and challenges involved, and cover some of the potential attack vectors.

Curious Looks  

Prevent attackers from spying on DNS communication or manipulating responses by encrypting your DNS traffic on Linux with the DNS-over-TLS standard and the help of systemd-resolved.

All Together Now  

Ansible is usually the choice when you want to run a task on multiple servers; however, Sake, a lesser known command runner, might do better if your server fleet is large and the tasks to run are simple.

Fill 'Er Up!  

Tools that handle bare metal deployment are few and far between, but the free Tinkerbell program tackles this problem with a modern architecture that comes from the metal-as-a-service scene, allowing you to control the roll out through an API and configure systems with your automation tool of choice.

Strictly by the Book  

Configuration and security of authorization assignment and access control by Entra ID, formerly Azure Active Directory, requires careful consideration. We reveal how configuration as code works with PowerShell and Microsoft 365 DSC for tenant configuration in Entra ID.