Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Welcome
123RF_Chess-TOC.png
I remember when this whole agile methodology (Agile) thing hit several years ago. Project managers began spouting crazy new terms such as sprints, scrum, waterfall, and stand-ups.
Negotiating Hurdles
PhotobyJohnCamerononUnsplash_Computer-hurdles.png
Ransomware defense involves two strategies: identifying attacks and slowing the attackers to mitigate their effects.
Dinos in the Matrix
123RF_220701831_Velociraptor-Dinosaur_kreminska_resized.png
The open source tool Velociraptor is at the heart of a solution that automatically detects cyber threats in industrial environments, offering a defensive strategy and protecting critical infrastructures.
The Early Bird
Aleksey_Mnogosmyslov_123rf-chicken.png
The DefectDojo vulnerability management tool helps development teams and admins identify, track, and fix vulnerabilities early in the software development process.
Sharing the Load
123rf_200544796_Distribution_foodandmore_resized.png
In the Azure cloud, Microsoft offers the Azure Application Gateway managed service as a Layer 7 load balancer that needs virtually no internal resources to set up and operate.
Escape Room
123RF_146765223_Escape-Room_zeferli_resized.png
Implement a good, robust defense with an in-depth strategy of applying multiple layers of security to all components, including the human factor.
Contact
PO-27548-Unsplash-Photo_by_Claudio_Schwarz_on_Unsplash-Hands_Touching.png
We look at various approaches to RFID asset tracking, provide an understanding of the technologies and challenges involved, and cover some of the potential attack vectors.
Curious Looks
PhotobyAlexanderGreyonUnsplash_curious.png
Prevent attackers from spying on DNS communication or manipulating responses by encrypting your DNS traffic on Linux with the DNS-over-TLS standard and the help of systemd-resolved.
All Together Now
PhotobyAdrianHartantoonUnsplash_Marching-Band.png
Ansible is usually the choice when you want to run a task on multiple servers; however, Sake, a lesser known command runner, might do better if your server fleet is large and the tasks to run are simple.
Fill 'Er Up!
engin-akyurt-f4UbPVbJcjw-unsplash.png
Tools that handle bare metal deployment are few and far between, but the free Tinkerbell program tackles this problem with a modern architecture that comes from the metal-as-a-service scene, allowing you to control the roll out through an API and configure systems with your automation tool of choice.
« Previous
Next »
1
...
375
376
377
378
379
380
381
382
383
384
385
386
387
388
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.