1,278 Results for:url
- Sort by:
Learn how to use Terraform modules with examples
24 Oct 2023Running modules can benefit Terraform usability. Explore what a module in Terraform is, when you should use them, and run through some Terraform module examples. Read More
How to git clone a specific commit
04 Sep 2023Need to git clone a specific commit? There's no single command to do it, but clever use of branch and reset commands makes it possible to clone a single, specific git commit. Read More
Rogue state-aligned actors are most critical cyber threat to UK
13 Nov 2023The prospect of rogue nation-state-aligned attackers bringing down the UK’s critical infrastructure is keeping the NCSC up at night Read More
What to know about GraphQL vs. REST performance
15 Sep 2023Both GraphQL and REST aim to simplify API development, but they handle data differently. Carefully consider how those differences might affect performance. Read More
Explore the key features of Microsoft Defender for Cloud Apps
25 Jul 2023Monitoring and visibility are crucial when it comes to cloud security. Explore Microsoft Defender for Cloud Apps, and see how this cloud access security broker can mitigate threats. Read More
Understanding QR code security issues for enterprise devices
05 Aug 2022QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them. Read More
The exploitation of flaws in the HTTPS protocol
16 Apr 2019In this article in our Royal Holloway security series, Gage Boyle and Kenny Paterson consider the security weaknesses of HTTPS. The presence of “HTTPS” in a website URL provides enough confidence to consider ... Read More
A quick GitHub SSH clone example
11 Jan 2022Here's a quick example of how to perform a GitHub SSH clone operation. In just five minutes, learn how to create SSH keys, configure them in GitHub and perform the GitHub clone with SSH keys in Git. Read More
Phishing and ransomware dominate Singapore’s cyber threat landscape
23 Jun 2023Phishing and ransomware attacks continued apace in Singapore last year amid signs of improving cyber hygiene Read More
How generative AI is put to work in business applications
08 Dec 2023Generative AI has kicked up a storm in 2023. We look the opportunities and challenges for businesses, highlighting a range of live applications Read More