Subscribe to get all the news, info and tutorials you need to build better business apps and sites
We'll update you weekly with all the latest news and tips you need to develop and deploy today's business apps.
When an Exchange organization is made available for external and internal access, the proper SSL certificate must be installed on the server.
On-premise data centers vs. the cloud: which environment offers stronger data security?
Proper security hygiene is impossible without some form of automation. Too many hours are wasted due to manual effort when security and IT teams could be spending time on more critical issues.
2019 was an interesting year for cybersecurity, with a wide variety of data breaches that drove a growing awareness of the essential nature of cybersecurity and perhaps a deserved respect for those in the industry.
One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally.
Adversaries can utilize MITM attacks to steal credentials, even when they are protected by SSL.
It happened again, the Avast CCleaner application has been targeted by another attempted supply chain attack. This most recent supply chain attack should serve as an important security reminder for everyone.
Some may argue that VPNs enhance security (encrypted connections etc.) but their core aim is privacy – it’s in the name – virtual private network.
The holidays just might be “the most wonderful time of the year” as the old-time carol says. But for IT security teams that oversee e-commerce websites, the holidays can also be “the scariest time of the year.”
One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files.