1,278 Results for:url

  • Sort by: 

Learn how to use Terraform modules with examples

By Anthony Howell 24 Oct 2023

Running modules can benefit Terraform usability. Explore what a module in Terraform is, when you should use them, and run through some Terraform module examples. Read More

How to git clone a specific commit

By Cameron McKenzie 04 Sep 2023

Need to git clone a specific commit? There's no single command to do it, but clever use of branch and reset commands makes it possible to clone a single, specific git commit. Read More

Rogue state-aligned actors are most critical cyber threat to UK

By Alex Scroxton 13 Nov 2023

The prospect of rogue nation-state-aligned attackers bringing down the UK’s critical infrastructure is keeping the NCSC up at night Read More

What to know about GraphQL vs. REST performance

By Kerry Doyle 15 Sep 2023

Both GraphQL and REST aim to simplify API development, but they handle data differently. Carefully consider how those differences might affect performance. Read More

Explore the key features of Microsoft Defender for Cloud Apps

By Liam Cleary 25 Jul 2023

Monitoring and visibility are crucial when it comes to cloud security. Explore Microsoft Defender for Cloud Apps, and see how this cloud access security broker can mitigate threats. Read More

Understanding QR code security issues for enterprise devices

By Brien Posey 05 Aug 2022

QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them. Read More

The exploitation of flaws in the HTTPS protocol

16 Apr 2019

In this article in our Royal Holloway security series, Gage Boyle and Kenny Paterson consider the security weaknesses of HTTPS. The presence of “HTTPS” in a website URL provides enough confidence to consider ... Read More

A quick GitHub SSH clone example

By Cameron McKenzie 11 Jan 2022

Here's a quick example of how to perform a GitHub SSH clone operation. In just five minutes, learn how to create SSH keys, configure them in GitHub and perform the GitHub clone with SSH keys in Git. Read More

Phishing and ransomware dominate Singapore’s cyber threat landscape

By Aaron Tan 23 Jun 2023

Phishing and ransomware attacks continued apace in Singapore last year amid signs of improving cyber hygiene Read More

How generative AI is put to work in business applications

By Peter Ray Allison 08 Dec 2023

Generative AI has kicked up a storm in 2023. We look the opportunities and challenges for businesses, highlighting a range of live applications Read More