860 Results for:PDF
- Sort by:
Government digital chiefs outline plans for CDDO and GDS
04 May 2021Paul Willmott, Joanna Davinson and Tom Read talk about establishing a digital, data and technology sub-board, plans to hire a chief technology officer and a chief data officer, and a five-year plan for the ... Read More
Web app ubiquity gives cyber criminals new opportunities
05 Feb 2020The popularity and ubiquity of web-based apps such as Office 365 and Salesforce is a temptation too good to miss for cyber criminals Read More
Chrome OS 74 brings support for AI search, annotations and more
03 May 2019Google's Chrome OS 74 release includes numerous organizational, accessibility and security upgrades, as well as Android and Linux support, to improve usability. Read More
Integrate legacy Windows applications with modern device capabilities
20 Nov 2018Enabling virtual desktop users to open apps in the format that allows the apps to function best would be ideal, but there's work to do to enable this capability. Read More
PowerShell Clears Stale Printer Objects
29 May 2019Because PowerShell clears stale Printer objects quickly and easily, checks and cleanups are worth integrating into routine system maintenance activities. Read More
The Open Group finalizes Open Agile Architecture standard
30 Sep 2020The Open Group published a new standard to provide guidance and best practices for enterprise architects transitioning to Agile methodologies for digital transformation. Read More
Elastic Stack Security tutorial: How to create detection rules
29 Nov 2021This excerpt from 'Threat Hunting with Elastic Stack' provides step-by-step instructions to create detection rules and monitor network security events data. Read More
What It Means to Go Beyond ADT Notification Requirement: Part II
02 Nov 2020The ADT requirement can help close care gaps and reduce readmissions when appropriately and widely used. Read More
Implement API rate limiting to reduce attack surfaces
28 Feb 2022Rate limiting can help developers prevent APIs from being overwhelmed with requests, thus preventing denial-of-service attacks. Learn how to implement rate limiting here. Read More
Adopting threat hunting techniques, tactics and strategy
21 Jan 2021Adopt threat hunting techniques that analyze the right data, detect anomalies, use frameworks and compare success metrics, combining manual techniques with AI and machine learning. Read More