Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4528 matches
Up to Date
PhotobyGarrettButleronUnsplash_up-to-date.png
The replacement for the Log Analytics Agent has improved security and cost efficiency, better manageability, and greater reliability – and you must migrate to this new solution by the end of 2024.
Wasp Attack
PhotobyUSGSonUnsplash_Wasp.png
Ethical hacking against the Mutillidae II vulnerable application can improve your security knowledge.
Fishing in the Flow
PO-23835-123RF-Sergii_Figurnyi_123RF-Katze_vor_Laptop-Aquarium_resized.png
OpenNMS collects and visualizes flows so you can discover which network devices communicate with each other and the volume of data transferred.
Eloquent
PhotobySimonWilkesonUnsplash_Eloquent.png
As systems grow more complex and distributed, managing and making sense of logs used for monitoring, debugging, and troubleshooting can become a daunting task. Fluentd and its lighter counterpart Fluent Bit can help you unify data collection and consumption to make sense of logging data.
Tech News
In the news: US Agencies Issue Quantum-Readiness Recommendations; Bitwarden Secrets Manager; IBM X-Force Releases Detection and Response Framework for Managed File Transfers; National Strategy to Expand US Cyber Workforce; SEC Adopts New Rules for Disclosure of Cybersecurity Incidents; Canonical Announces Real-Time Ubuntu for Intel Core; EU-US Data Privacy Framework Ensures Safe Data Transfers; IEEE Releases New Standard for LiFi Communications; EU Health Sector Security Risks; and JupyterLab 4.0.
Lightning
PhotobyMichaelDonUnsplash_lightning.png
The powerful Cloudflare Tunnel provides secure and seamless access to servers and applications, making it a convenient alternative to VPN for any modern IT infrastructure.
Power Play
PhotobyHassanPashaonUnsplash_chess.png
Measure, predict, and optimize the carbon footprint of your containerized workloads.
Self-Control
PO-26936-123RF-andreysuslov_123rf-Security_system_of_smart_home__3d_house_plan_x-ray__Control_locks_the_doors_and_windows_over_the_internet_with_sm...
Most routers provided by ISPs are built cheaply, come with low-quality firmware, and are insufficient even for basic tasks. MikroTik manufactures a line of affordable routers for those in need of professional network gear.
Main Line
PhotobyFelixPradoonUnsplash.png
We investigate best practices to secure CI/CD pipelines with DevSecOps.
Risky Business
Perf_Dojo_123RF_9719495_LucyBaldwin_resized.png
Testing the performance of an open source RISC-V CPU.
« Previous
Next »
1
...
378
379
380
381
382
383
384
385
386
387
388
389
390
391
...
453
Powered by
eZ Publish™ CMS Open Source Web Content Management
. Copyright © 1999-2014
eZ Systems AS
(except where otherwise noted). All rights reserved.