security

Top 5 cybersecurity assessment tools for networking professionals

Security is one of the major concerns while setting up data centers in the cloud. Although firewalls and managed networking…

6 years ago

How to secure ElasticCache in AWS

AWS offers services to handle the cache management process. Earlier, we were using Memcached or Redis installed on VM, which…

6 years ago

What is Digital Forensics?

Who here hasn’t watched the American TV show, Mr. Robot? For the uninitiated, Mr. Robot is a digital crime thriller…

6 years ago

IoT Forensics: Security in an always connected world where things talk

Connected physical devices, home automation appliances, and wearable devices are all part of Internet of Things (IoT). All of these…

6 years ago

Microsoft Cloud Services get GDPR Enhancements

With the GDPR deadline looming closer everyday, Microsoft has started to apply General Data Protection Regulation (GDPR) to its cloud…

6 years ago

Security news bulletin – Wednesday 18 April

Welcome to this week's security news bulletin. This is where you'll find updates from around the web on what's happening…

6 years ago

Top 5 cloud security threats to look out for in 2018

In the era of cloud deployment and DevOps, cloud adoption has seen a steady rise since 2017. Forbes report state…

6 years ago

Web Security Update: CASL 2.0 releases!

CASL has released a new version 2.0 bringing with it several compelling opportunities for enhancing web app authorization methods. CASL…

6 years ago

Kubernetes 1.10 released

Kubernetes has announced their first release of 2018: Kubernetes 1.10. This release majorly focuses on stabilizing 3 key areas which…

6 years ago

How to secure data in Salesforce Einstein Analytics

[box type="note" align="" class="" width=""]The following excerpt is taken from the book Learning Einstein Analytics written by Santosh Chitalkar. This…

6 years ago