860 Results for:PDF

  • Sort by: 

Why a Data Exchange Platform Is Vital to Healthcare Interoperability

30 Mar 2023

Despite high adoption rates of health IT, there is still a clear disconnect in how health data is shared between organizations, making clear the need for a data integration platform. Read More

12 best patch management software and tools for 2024

By Robert Sheldon 31 Jan 2024

These 12 tools approach patching from different perspectives. Understanding their various approaches can help you find the right product for your needs. Read More

Apply policy-as-code best practices to reap benefits

By Kurt Marko 25 Jan 2022

A spinoff of infrastructure as code, policy as code applies its core principles to policy management and implementation. Here's why -- and the best way -- to adopt it. Read More

MaliBot Android malware spreading fast, says Check Point

By Alex Scroxton 12 Jul 2022

The MaliBot malware is becoming a persistent and widespread problem, and Android users should be on their guard, says Check Point Read More

How to use Azure AD Connect synchronization for hybrid IAM

By Kyle Johnson, Packt Publishing 11 Apr 2023

Organizations face many challenges authenticating and authorizing users in hybrid infrastructures. One way to handle hybrid IAM is with Microsoft Azure AD Connect for synchronization. Read More

Iranian hacking groups pick up the pace with new attacks

By Shaun Nichols 01 Feb 2022

Two security vendors are reporting a fresh wave of targeted attacks and malware outbreaks believed to be the work of Iranian state-sponsored threat groups. Read More

Progress promotes people-centric programming

By Adrian Bridgwater 14 Sep 2022

Developers build code and so, logically, they need to deliver code above all else, right? This misconception was one of the lies developers tell themselves tabled by Microsoft's Billy Hollis during ... Read More

Russia’s Cozy Bear abusing Dropbox, Google Drive to target victims

By Alex Scroxton 20 Jul 2022

Russian APT known as Cozy Bear has become adept at quickly incorporating popular cloud storage services into its attack chain to avoid detection Read More

Attack surface reduction rules for Microsoft productivity apps

By Kyle Johnson, Packt Publishing 05 Jun 2023

Attack surface reduction rules in Microsoft Defender for Endpoint help prevent apps from launching executable files and scripts, running suspicious scripts and more. Read More

ICS kill chain: Adapting the cyber kill chain to ICS environments

By Sharon Shea, Packt Publishing 05 Apr 2023

As IT/OT convergence continues to gain traction, industrial control system security cannot be ignored. Performing pen tests based on the ICS Kill Chain can help. Read More