860 Results for:PDF
- Sort by:
Why a Data Exchange Platform Is Vital to Healthcare Interoperability
30 Mar 2023Despite high adoption rates of health IT, there is still a clear disconnect in how health data is shared between organizations, making clear the need for a data integration platform. Read More
12 best patch management software and tools for 2024
31 Jan 2024These 12 tools approach patching from different perspectives. Understanding their various approaches can help you find the right product for your needs. Read More
Apply policy-as-code best practices to reap benefits
25 Jan 2022A spinoff of infrastructure as code, policy as code applies its core principles to policy management and implementation. Here's why -- and the best way -- to adopt it. Read More
MaliBot Android malware spreading fast, says Check Point
12 Jul 2022The MaliBot malware is becoming a persistent and widespread problem, and Android users should be on their guard, says Check Point Read More
How to use Azure AD Connect synchronization for hybrid IAM
11 Apr 2023Organizations face many challenges authenticating and authorizing users in hybrid infrastructures. One way to handle hybrid IAM is with Microsoft Azure AD Connect for synchronization. Read More
Iranian hacking groups pick up the pace with new attacks
01 Feb 2022Two security vendors are reporting a fresh wave of targeted attacks and malware outbreaks believed to be the work of Iranian state-sponsored threat groups. Read More
Progress promotes people-centric programming
14 Sep 2022Developers build code and so, logically, they need to deliver code above all else, right? This misconception was one of the lies developers tell themselves tabled by Microsoft's Billy Hollis during ... Read More
Russia’s Cozy Bear abusing Dropbox, Google Drive to target victims
20 Jul 2022Russian APT known as Cozy Bear has become adept at quickly incorporating popular cloud storage services into its attack chain to avoid detection Read More
Attack surface reduction rules for Microsoft productivity apps
05 Jun 2023Attack surface reduction rules in Microsoft Defender for Endpoint help prevent apps from launching executable files and scripts, running suspicious scripts and more. Read More
ICS kill chain: Adapting the cyber kill chain to ICS environments
05 Apr 2023As IT/OT convergence continues to gain traction, industrial control system security cannot be ignored. Performing pen tests based on the ICS Kill Chain can help. Read More