860 Results for:PDF

  • Sort by: 

Cato aims to bust cyber myths as it extends network protections

By Alex Scroxton 20 Jul 2022

Cato Networks is beefing up its platform’s security features with ransomware and data loss protections, and the firm’s security strategy lead Etay Maor is using the occasion – and his unique access to billions of ... Read More

Principle of least privilege examples & best practices

By Cameron McKenzie 19 Jan 2022

We see examples of the principle of least privilege everywhere in our daily lives. What does the principle of least privilege mean as applied to security in software development and DevOps? Read More

Yellowfin 9.3 features embedded app development upgrades

By Eric Avidon 15 Oct 2020

New application programming interfaces to help app designers build embedded BI apps are among more than 25 new features in the latest update of the Yellowfin analytics platform. Read More

National Highways sets out data-driven plan for Strategic Road Network

By Cliff Saran 02 Sep 2021

Digital twins, data sharing, predictive analytics and the use of drones all get a mention in Digital Roads five-year strategic plan Read More

Top 6 e-signature software providers in 2022

By Christine Campbell 09 Aug 2022

E-signature software can reduce paper costs and improve productivity across departments. Organizations can explore the following six software options to fit their business needs. Read More

Making sense of the UK Cybersecurity Skills market.

By Philip Virgo 23 May 2023

There is much talk of cybersecurity skills shortages and there are many initiatives. Most do not relate to the skills you most need to help protect your business, your supply chain and your ... Read More

Experts: Ransomware protection needs smart storage strategy

By Tim McCarthy 19 Aug 2021

Vendor products can offer unique ransomware protections, but comprehensive strategies across storage clouds and formats still form core of IT protection. Read More

How to prevent SQL injection with prepared statements

By Sharon Shea, The Pragmatic Programmers LLC 29 Nov 2022

One of the top defenses against SQL injection is prepared statements. In this book excerpt, learn what prepared statements are and how to extend their defense. Read More

Sample CompTIA CySA+ test questions with answers

By Isabella Harford, Pearson Education 04 Aug 2021

Going for your CompTIA CySA+ certification? Test what you know before taking the exam with these sample test questions on vulnerability assessment output. Read More

How to configure and customize Kali Linux

By Kyle Johnson, Packt Publishing 13 Oct 2022

Learning how to use Kali Linux for ethical hacking and penetration testing? Read step by step how to configure and customize the distribution. Read More