Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Scope of Concern
123rf_147234006_concerned_AntonioGuillemFernandez_resized.png
Microsoft Purview combines compliance and data governance to address the security of confidential data in the new hybrid working world.
Strength in Numbers
PhotobyDanBurtononUnsplash_numbers.png
Threats can be detected and averted at an early stage with crowd security, in which organizations form a community to take concentrated action against cyberattacks by sharing attack data. We explain how this strategy works with the CrowdSec cloud service.
New Gold
Maksim_Kabakou_123RF-Gold-Lock.png
Protecting data becomes increasingly important as the quantity and value of information grows. We describe the basics of data security and governance and how they intertwine.
Checkup
Kritiya_Sumpun_123RF-first_aid.png
Automated acceptance testing is a powerful tool for catching problems related to misconfiguration. We'll show you how to implement your own acceptance testing environment with a free tool called goss.
Right the First Time
123RF_181455488_neoleo3d_Number_Ten_resized.png
Ansible is considered by far the most practical automation tool, but in many places, quirks make life with the tool unnecessarily complicated. We reveal the 10 best tricks for Ansible on Linux.
Tech News
News_Email_123RF-ulisse.png
In the news: StarlingX 8.0 Edge Platform; Synopsys Report Shows "Alarming" Increase in High-Risk Vulnerabilities; Akamai Connected Cloud; Red Hat Enterprise Linux Available on Oracle Cloud; Wine 8.0; LibreOffice 7.5; Veracode Report Tracks Security Flaws Over the Application Lifecycle; and Malware Remains Top Cause of Cybersecurity Incidents.
Tracking Down Attackers
PhotobyTobiasTulliusonUnsplash.png
Monitoring with built-in Windows tools can prevent the worst from happening after an attempted attack.
Shipshape
PhotobyIlseOrselonUnsplash_Ship.png
Whether you are developing containerized applications or running them, observing best practices helps to obtain optimal results.
Tailor-Made
PhotobypinamessinaonUnsplash_TailorMade.png
The Kerberos protocol makes the process of logging in to a service completely transparent to the user. The MIT Kerberos library lets you implement different security requirements for individual services.
Smart Assistant
PhotobyOnderOrtelonUnsplash.png
Acorn promises to enable the deployment of applications in hypercomplex Kubernetes constructs in seconds.
« Previous
Next »
1
...
295
296
297
298
299
300
301
302
303
304
305
306
307
308
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.