1,278 Results for:url

  • Sort by: 

The ultimate guide to cybersecurity planning for businesses

By Craig Stedman 26 Jan 2024

This in-depth cybersecurity planning guide provides information and advice to help organizations develop a successful strategy to protect their IT systems from attacks. Read More

Secure Azure Functions with these authentication methods

By Liam Cleary 18 Sep 2023

Securing Azure Functions is paramount to maintaining the integrity and reliability of your applications. Read over the methods, tools and best practices. Read More

How honey tokens support cyber deception strategies

By Rob Shapland, Alissa Irei 31 Jul 2023

Learn how to flip the script on malicious hackers with honey tokens, which act like tripwires to reveal an attacker's presence. Read More

Hibernate and JPA 3 CRUD example

By Cameron McKenzie 15 May 2023

Struggling to get your first JPA 3 application off the ground? Here's a quick Hibernate and JPA 3 CRUD example to help you get going with the latest version of the Java Persistence API. Read More

What Are the Four Levels of Health Data Interoperability?

By Hannah Nelson 14 Sep 2023

According to the Healthcare Information and Management Systems Society (HIMSS), health data interoperability has four levels: foundational, structural, semantic, and organizational. Read More

How to use the Hydra password-cracking tool

By Ed Moyle 06 Dec 2022

Need help brute-forcing passwords? Get started by learning how to use the open source Hydra tool with these step-by-step instructions and companion video. Read More

Dissect open source ransomware code to understand an attack

By Matthew Grasberger 14 Nov 2022

To protect your organization from ransomware, it's helpful to know what goes on behind the scenes. Unpack this ransomware code example to understand and defend against attacks. Read More

How to setup an Nginx load balancer example

By Cameron McKenzie 05 Jun 2022

Nginx is among the most popular load balancers and reverse proxy servers for enterprises. Here's how to quickly setup Nginx as a load balancer and configure weighted nodes and sticky sessions. Read More

How to use startup scripts in Google Cloud

By Will Kelly 16 Mar 2023

Google Cloud lets you use startup scripts when booting VMs to improve security and reliability. Follow these steps to create your own startup scripts. Read More

The right MySQL persistence.xml example file for JPA 3 and Hibernate 6

By Cameron McKenzie 01 May 2023

A quick migration from JPA 2.x to 3.x can become bottlenecked if the persistence.xml file is misconfigured. Here's what a proper persistence.xml file for JPA 3, Hibernate 6 and a MySQL database ... Read More