860 Results for:PDF

  • Sort by: 

Government digital chiefs outline plans for CDDO and GDS

By Lis Evenstad 04 May 2021

Paul Willmott, Joanna Davinson and Tom Read talk about establishing a digital, data and technology sub-board, plans to hire a chief technology officer and a chief data officer, and a five-year plan for the ... Read More

Web app ubiquity gives cyber criminals new opportunities

By Alex Scroxton 05 Feb 2020

The popularity and ubiquity of web-based apps such as Office 365 and Salesforce is a temptation too good to miss for cyber criminals Read More

Chrome OS 74 brings support for AI search, annotations and more

By Sabrina Polin 03 May 2019

Google's Chrome OS 74 release includes numerous organizational, accessibility and security upgrades, as well as Android and Linux support, to improve usability. Read More

Integrate legacy Windows applications with modern device capabilities

By Alastair Cooke 20 Nov 2018

Enabling virtual desktop users to open apps in the format that allows the apps to function best would be ideal, but there's work to do to enable this capability. Read More

PowerShell Clears Stale Printer Objects

By Ed Tittel 29 May 2019

Because PowerShell clears stale Printer objects quickly and easily, checks and cleanups are worth integrating into routine system maintenance activities. Read More

The Open Group finalizes Open Agile Architecture standard

By Carol Sliwa 30 Sep 2020

The Open Group published a new standard to provide guidance and best practices for enterprise architects transitioning to Agile methodologies for digital transformation. Read More

Elastic Stack Security tutorial: How to create detection rules

By Kyle Johnson, Packt Publishing 29 Nov 2021

This excerpt from 'Threat Hunting with Elastic Stack' provides step-by-step instructions to create detection rules and monitor network security events data. Read More

What It Means to Go Beyond ADT Notification Requirement: Part II

02 Nov 2020

The ADT requirement can help close care gaps and reduce readmissions when appropriately and widely used. Read More

Implement API rate limiting to reduce attack surfaces

By Kyle Johnson, Manning Publications Co. 28 Feb 2022

Rate limiting can help developers prevent APIs from being overwhelmed with requests, thus preventing denial-of-service attacks. Learn how to implement rate limiting here. Read More

Adopting threat hunting techniques, tactics and strategy

By Johna Till Johnson 21 Jan 2021

Adopt threat hunting techniques that analyze the right data, detect anomalies, use frameworks and compare success metrics, combining manual techniques with AI and machine learning. Read More