942 Results for:DNS

  • Sort by: 

Cloudian's new load balancer targets object storage sprawl

By Tim McCarthy 16 Aug 2022

Cloudian customers can simplify support needs and hardware misconfigurations with the new HyperBalance load balancer, the result of a new partnership with LoadBalancer.org. Read More

Use shadow IT discovery to find unauthorized devices and apps

By Karen Scarfone 15 Sep 2022

Shadow IT may be convenient for users, but it isn't for IT -- especially where security is concerned. Shadow IT discovery finds unmanaged devices and apps. Read More

Security Think Tank: A brief history of (secure) coding

By Michael Healey 31 May 2023

From controlling who was allowed to work with IBM mainframes to present-day DevSecOps techniques, the concept of secure coding has a longer history than you might think Read More

14 flaws in NicheStack put critical infrastructure at risk

By Alexander Culafi 04 Aug 2021

The vulnerability disclosure process for Infra:Halt, a set of flaws impacting critical infrastructure, took nearly a year, due to the nature of supply chain vulnerabilities. Read More

A Microsoft 365 email migration checklist

By Brien Posey 16 Jun 2021

When an organization migrates its email servers and profiles to Microsoft 365, it could use several different processes. Sort through the five options listed below. Read More

How to fix 8 common remote desktop connection problems

By Brien Posey 11 Dec 2020

When the connection between a desktop and its host fails, it's time to do some remote desktop troubleshooting. Check firewalls, security certificates and more if a remote desktop is not working. Read More

How an AWS multi-region architecture can strengthen DR

By George Lawton 22 Mar 2022

Meet AWS outages head on by learning how to build a multi-region architecture that achieves resiliency in the event of disaster. Read More

How to create an EC2 instance using PowerShell

By Anthony Howell 28 Jun 2022

PowerShell has practical integrations that provide users with cross-platform capabilities. Get to know prerequisites and resources to create an EC2 instance using PowerShell. Read More

Auto-tech series - Lacework: More automation + more code = more vulnerable

By Adrian Bridgwater 14 Apr 2023

This is a guest post for the Computer Weekly Developer Network written by Ryan Sheldrake in his capacity as Field CTO at Lacework - a company known for its cloud security automation technology. ... Read More

Learn how to install MicroK8s for Kubernetes

By Stuart Burns 15 Dec 2021

MicroK8s enables admins to deploy and destroy Kubernetes in a flash. Follow this tutorial to learn how to install MicroK8s and combine with Multipass. Read More