1,123 Results for:HTTPS

  • Sort by: 

Is it time for time-series databases?

By Adrian Bridgwater 25 Jan 2023

We need many types of data… and we need many types of databases. In our always-on world of continuous computing (and continuous integration and continuous deployment) there is (arguably) a more ... Read More

How to create a SOAR playbook in Microsoft Sentinel

By Kyle Johnson, Packt Publishing 22 Sep 2023

Using automation through tools such as SOAR and SIEM can improve incident response alert efficiency. One automated feature analysts can use is the SOAR playbook. Read More

Security Think Tank: A user’s guide to encryption

By Andrew Morris 18 Sep 2023

The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Read More

Finland connects a quantum computer to a supercomputer

By Pat Brans 06 Dec 2022

VTT and CSC recently connected a quantum computer with Europe’s fastest supercomputer to enable a hybrid service for researchers Read More

The Sequoia Project Seeks Feedback on Draft TEFCA FHIR Implementation Guide

By Hannah Nelson 11 Oct 2022

The Sequoia Project has published a draft facilitated FHIR implementation guide, which includes proposed technical and process requirements for TEFCA data exchange. Read More

Clean Git up!

By Cameron McKenzie 05 Sep 2023

There comes a time where you must clean up Git branches, commits and the repository as a whole. Here we show you how to compact your Git repo and keep things clean. Read More

Manage Kubernetes clusters with PowerShell and kubectl

By Anthony Howell 07 Nov 2022

Learn how to use the Kubernetes tool kubectl in PowerShell, including setting up aliasing and tab-completion, parsing JSON output and searching logs with the Select-String cmdlet. Read More

Learn how to bootstrap Kubernetes clusters with kubeadm

By Joydip Kanjilal 20 Oct 2022

In this guide, learn to create, configure and run a Kubernetes cluster from scratch with kubeadm, a command-line tool that simplifies and automates cluster setup and management. Read More

7 guidelines to secure network storage

By Julia Borgini 23 Aug 2022

These practices, including firmware and VPN guidance, protect NAS devices. Use these steps as standalone procedures or incorporate them into your overall security process. Read More

Top 7 cloud misconfigurations and best practices to avoid them

By Dave Shackleford 26 Oct 2023

Cloud security means keeping a close eye on the configuration of cloud resources and assets. These best practices can keep you safe from attackers and other malicious activities. Read More