Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Strictly by the Book
PhotobyTomHermansonUnsplash_Books.png
Configuration and security of authorization assignment and access control by Entra ID, formerly Azure Active Directory, requires careful consideration. We reveal how configuration as code works with PowerShell and Microsoft 365 DSC for tenant configuration in Entra ID.
Sophisticated Heist
PO-26101-123RF-alphaspirit_123RF_com-Security_resized.png
A method known as Kerberoasting is an exploitation technique of the Kerberos authentication protocol. We take a closer look at the available safeguards and detection measures against this attack.
Tech News
In the news: DHS Releases New Guidelines for Securing Critical Infrastructure; Datadog Report Examines DevSecOps Best Practices; Upskilling Key to Tech Staffing Challenges, Says LF Survey; 2024 Open Source Pros Job Survey Report Released; OpenSSF Issues Guidance to Help Prevent Social Engineering Attacks; Black Duck Supply Chain Edition Released by Synopsys; Spectra Logic Announces New Tape Libraries and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security; and NIST Releases Major New Version of Cybersecurity Framework.
Unboxing
PO-18637-Fotolia-Tjefferson_Fotolia-Weltkugel_in_Schachtel_resized.png
Already mandatory in the United States and recently approved in Europe thanks to new legislation, a software bill of materials provides information about software components, enabling IT managers to respond better to attacks and vulnerabilities.
Automatic
Kittipong_Jirasukhanont_123rf-robot_assembly.png
Construct Kubernetes clusters from the Azure CLI in a consistent and predictable manner across every environment.
Load Carrier
PhotobyNathanCimaonUnsplash.png
Setting up and making the most of network load balancing on Windows Server 2019 and 2022.
Tech News
In the news: CISA Directive Requires Federal Agencies to Secure Network Devices; SUSE Report Reveals Cloud Security Concerns; Canonical Sunbeam Extends OpenStack to Small Cloud Environments; IT Teams Struggle with Cloud Operations; NVIDIA Announces Large Memory AI Supercomputer; PostgreSQL 16 Beta; Red Hat Announces Ansible Lightspeed AI Service; Global Tech Adoption Trends from the World Economic Forum; and CIQ Announces New Infrastructure Management Platform.
Power Duo
PhotobyMulyadionUnsplash_Deadpool-Ironman.png
This comprehensive guide shows you how to merge the cross-platform capabilities of Ansible with PowerShell's robust Windows management features.
Speed Racer
Perf_Dojo_123RF_9719495_LucyBaldwin_resized.png
Testing single-board computer storage.
Gardening
PhotobyFrancescoGallarottionUnsplash-Gardening.png
Your Active Directory system doesn't have to be a walled garden. A few easy steps are all you need to integrate Linux with AD.
« Previous
Next »
1
...
376
377
378
379
380
381
382
383
384
385
386
387
388
389
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.