Frontpage
Navigation
Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4561 matches
Negotiating Hurdles
PhotobyJohnCamerononUnsplash_Computer-hurdles.png
Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.
Dinos in the Matrix
123RF_220701831_Velociraptor-Dinosaur_kreminska_resized.png
The open source tool Velociraptor is at the heart of a solution that automatically detects cyber threats in industrial environments, offering a defensive strategy and protecting critical infrastructures.
The Early Bird
Aleksey_Mnogosmyslov_123rf-chicken.png
The DefectDojo vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.
Sharing the Load
123rf_200544796_Distribution_foodandmore_resized.png
In the Azure cloud, Microsoft offers the Azure Application Gateway managed service as a Layer 7 load balancer that needs virtually no internal resources to set up and operate.
Escape Room
123RF_146765223_Escape-Room_zeferli_resized.png
Implement a good, robust defense with an in-depth strategy of applying multiple layers of security to all components, including the human factor.
Contact
PO-27548-Unsplash-Photo_by_Claudio_Schwarz_on_Unsplash-Hands_Touching.png
We look at various approaches to RFID asset tracking, provide an understanding of the technologies and challenges involved, and cover some of the potential attack vectors.
Curious Looks
PhotobyAlexanderGreyonUnsplash_curious.png
Prevent attackers from spying on DNS communication or manipulating responses by encrypting your DNS traffic on Linux with the DNS-over-TLS standard and the help of systemd-resolved.
All Together Now
PhotobyAdrianHartantoonUnsplash_Marching-Band.png
Ansible is usually the choice when you want to run a task on multiple servers; however, Sake, a lesser known command runner, might do better if your server fleet is large and the tasks to run are simple.
Fill 'Er Up!
engin-akyurt-f4UbPVbJcjw-unsplash.png
Tools that handle bare metal deployment are few and far between, but the free Tinkerbell program tackles this problem with a modern architecture that comes from the metal-as-a-service scene, allowing you to control the roll out through an API and configure systems with your automation tool of choice.
Strictly by the Book
PhotobyTomHermansonUnsplash_Books.png
Configuration and security of authorization assignment and access control by Entra ID, formerly Azure Active Directory, requires careful consideration. We reveal how configuration as code works with PowerShell and Microsoft 365 DSC for tenant configuration in Entra ID.
« Previous
Next »
1
...
375
376
377
378
379
380
381
382
383
384
385
386
387
388
...
457