1,278 Results for:url

  • Sort by: 

Working with the Microsoft Defender for Identity portal

By Liam Cleary 21 Sep 2021

The security product, formerly Azure Advanced Threat Protection, taps into the cloud to uncover suspicious activity across the on-premises network. Read More

TA2451 targets aviation and transport sector with tailored lures

By Alex Scroxton 15 Feb 2022

Newly designated cyber criminal group favours highly specific lures and a tried-and-tested modus operandi to compromise targets in the aviation, aerospace and transport sectors Read More

Unit 42 finds polyglot files delivering IcedID malware

By Arielle Waldman 29 Sep 2022

Palo Alto Networks' Unit 42 says attackers are using decoy Microsoft Compiled HTML Help files containing multiple file formats to infect systems with information-stealing malware. Read More

How to create a cybersecurity awareness training program

By Alissa Irei, Mike Chapple 27 Oct 2023

Cybersecurity awareness training often misses the mark, leaving employees undereducated and organizations vulnerable to attack. Here's how to succeed where too many fail. Read More

A guide to enrolling Apple devices in Jamf

By Michael Goad 23 Feb 2022

Organizations should consider management platforms from specialized vendors, such as Jamf, for specific OSes including Apple iOS. Learn how to enroll Apple devices into Jamf here. Read More

NCSC exposes Iranian, Russian spear-phishing campaign targeting UK

By Alex Scroxton 25 Jan 2023

Spear-phishing campaigns likely linked to Iranian and Russian espionage activity are targeting persons of interest in the UK, warns the NCSC Read More

How to setup an Nginx reverse proxy server example

By Cameron McKenzie 28 May 2022

Here's a quick tutorial to setup an Nginx reverse proxy server. This example uses an Apache Tomcat server but the config settings apply for other backend app servers such as Node, Express, ... Read More

How to create a GitHub repository

By Cameron McKenzie 30 Mar 2021

This GitHub repository tutorial shows users how to create a new repository in the popular, cloud-hosted Git offering. Let’s dig into the central concepts of GitHub-based DevOps. Read More

Play ransomware actors bypass ProxyNotShell mitigations

By Arielle Waldman 21 Dec 2022

CrowdStrike is urging organizations to apply the latest Microsoft Exchange updates after investigations revealed attackers developed a bypass for ProxyNotShell mitigations. Read More

Set up a machine learning pipeline in this Kubeflow tutorial

By Chris Tozzi 19 Apr 2023

For teams running machine learning workflows with Kubernetes, using Kubeflow can lead to faster, smoother deployments. Get started with this installation guide. Read More