1,123 Results for:HTTPS
- Sort by:
Is it time for time-series databases?
25 Jan 2023We need many types of data… and we need many types of databases. In our always-on world of continuous computing (and continuous integration and continuous deployment) there is (arguably) a more ... Read More
How to create a SOAR playbook in Microsoft Sentinel
22 Sep 2023Using automation through tools such as SOAR and SIEM can improve incident response alert efficiency. One automated feature analysts can use is the SOAR playbook. Read More
Security Think Tank: A user’s guide to encryption
18 Sep 2023The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum Read More
Finland connects a quantum computer to a supercomputer
06 Dec 2022VTT and CSC recently connected a quantum computer with Europe’s fastest supercomputer to enable a hybrid service for researchers Read More
The Sequoia Project Seeks Feedback on Draft TEFCA FHIR Implementation Guide
11 Oct 2022The Sequoia Project has published a draft facilitated FHIR implementation guide, which includes proposed technical and process requirements for TEFCA data exchange. Read More
Clean Git up!
05 Sep 2023There comes a time where you must clean up Git branches, commits and the repository as a whole. Here we show you how to compact your Git repo and keep things clean. Read More
Manage Kubernetes clusters with PowerShell and kubectl
07 Nov 2022Learn how to use the Kubernetes tool kubectl in PowerShell, including setting up aliasing and tab-completion, parsing JSON output and searching logs with the Select-String cmdlet. Read More
Learn how to bootstrap Kubernetes clusters with kubeadm
20 Oct 2022In this guide, learn to create, configure and run a Kubernetes cluster from scratch with kubeadm, a command-line tool that simplifies and automates cluster setup and management. Read More
7 guidelines to secure network storage
23 Aug 2022These practices, including firmware and VPN guidance, protect NAS devices. Use these steps as standalone procedures or incorporate them into your overall security process. Read More
Top 7 cloud misconfigurations and best practices to avoid them
26 Oct 2023Cloud security means keeping a close eye on the configuration of cloud resources and assets. These best practices can keep you safe from attackers and other malicious activities. Read More