Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Automated Jenkins CI
123RF_92928899_Robots_Kittipong Jirasukhanont_200x135
A Jenkins build pipeline frees developers from repetitive manual build tasks by facilitating automation and provides broad traceability with continuous logging and feedback.
Jekyll
123RF_41808499_doctor_Luca-Bertolli_200x135
Jekyll is a lightweight, fast, HTML engine that renders websites with ease, with the added benefits of low cost, high speed, security, and free hosting with GitHub Pages.
Staying on Top
PhotobyJoshuaEarleonUnsplash_63441_Mountain-top.png
When dozens of new services and VMs emerge and disappear every day in dynamic cloud environments, conventional monitoring provides false alarms, not operational security.
Dig Deep
PhotobyqinghillonUnsplash-39069-Construction-Site.png
Scout2 is an open source auditing tool that helps you keep your AWS environments secure.
On the Prowl
PhotobyGerandeKlerkonUnsplash_546769_Cat-Hunting.png
Security vulnerabilities often remain unknown when the data they reveal is buried in the depths of logfiles. Apache Spot uses big data and machine learning technologies to sniff out known and unknown IT security threats.
Fingerprints
PO-22620-123RF-Bruce_Rolff_123RF-Fingerabdruck_unter_Lupe_resized.png
When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.
Secret, Quick, Quiet
Unsplash-Geran_de_Klerk_Unsplash-Cat_Hunting.png
The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
Dynamic Duo
PO-25508-123RF-Maxim_Maksutov_123RF-Superhelden_Duo__resized.png
Pitting the OWASP Zed Attack Proxy against an insecure web app in a Docker container illustrates how you can tick a lot of security checkboxes.
Robot Admin
PhotobyRocknRollMonkeyonUnsplash-681546.png
Chef, one of the oldest automation solutions, seeks to become a universal administration robot for cloud environments with new version 2.0.
Unequal Pair
123RF_31970382_big-small_AndreaDanti_resized.png
Data protection and data security are similar-sounding aspects of information security: one legal and one technical.
« Previous
Next »
1
...
324
325
326
327
328
329
330
331
332
333
334
335
336
337
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.