1,123 Results for:HTTPS

  • Sort by: 

Google algorithms explained: Everything you need to know

By Ben Lutkevich 20 Apr 2023

There are petabytes of information on Google, and its algorithm is the engine that organizes it all. Read More

Set up a machine learning pipeline in this Kubeflow tutorial

By Chris Tozzi 19 Apr 2023

For teams running machine learning workflows with Kubernetes, using Kubeflow can lead to faster, smoother deployments. Get started with this installation guide. Read More

How to become a bug bounty hunter: Getting started

By Alissa Irei 23 May 2023

Finding, exploiting and reporting vulnerabilities can be both lucrative and educational. Security researcher Vickie Li explains how to become a bug bounty hunter. Read More

3 types of PKI certificates and their use cases

By Isabella Harford 10 Jun 2022

Public key infrastructure helps authenticate senders via cryptography and digital certificates. Learn about three types of PKI certificates and their use cases. Read More

Step-by-step guide: Get started with Weave for Kubernetes

By Chris Tozzi 09 Mar 2023

Looking to streamline network management for Kubernetes clusters? Learn when and how to use CNI plugins, then walk through the steps of a Weave installation for Kubernetes. Read More

Top 10 cybersecurity interview questions and answers

By Steve Zurier 19 Aug 2022

Interviewing for a job in cybersecurity? Memorizing security terms won't cut it. Here are the 10 interview questions you should be ready for -- and how to answer them. Read More

How to set up a K3s cluster

By Chris Tozzi 02 Jun 2022

Admins have choices when it comes to selecting a Kubernetes distribution. One such option is K3s, which can be used for development or production. Here's how to get started. Read More

How hackers exploited RCE vulnerabilities in Atlassian, Azure

By Shaun Nichols 13 Oct 2021

Barracuda researchers examined exploitation activity and attack patterns for two remote code execution vulnerabilities affecting Atlassian's Confluence and Microsoft's Azure. Read More

API series - Pantheon: Building web experiences with APIs & Jamstack

By Adrian Bridgwater 28 Sep 2022

This is a guest post for the Computer Weekly Developer Network API series written by Josh Koenig in his role as co-founder and chief strategy officer at Pantheon. Pantheon is a WebOps platform for ... Read More

Keycloak tutorial: How to secure different application types

By Kyle Johnson, Packt Publishing 30 Jul 2021

IT pros and developers can secure applications with the open source IAM tool Keycloak. When you don't need to worry about passwords, it reduces the potential attack surface. Read More