Good ol’ fashioned cron can greatly simplify system maintenance.
Letsencrypt tips and tricks
Who wants to issue certificates manually if they can take Letsencrypt’s Certbot to the task.
Clicking Clean Virginia: dirty energy powering the Data Center Alley
The digital transformation is driving a relentless growth of the data center industry. The main limiting factor is the availability of affordable power. Data center operators want cheap electricity. Their other stock holders want it green.
How to set up DMARC
The relentless onslaught of spam continues to drive mail administrators up the proverbial wall. DMARC, the unofficial successor to SPF (Sender Policy Framework), holds the promise of more email legitimacy, but can it deliver? Here is how you can put DMARC to the test.
TLS 1.3 and its implications for cyber security
The rise of Quantum computing and the cloud is rewriting the rules of what constitutes “encrypted” communications — with profound implications for the cyber security of our homeland.
“The cyber threat landscape is shifting in real-time, and we have reached a historic turning point,” said Kirstjen Nielsen, U.S. Secretary of Homeland Security, in a recent statement. “It is clear that our cyber adversaries can now threaten the very fabric of our republic itself.”
Cybersecurity incidents and data breaches of recent years seem to provide evidence of an invisible warfare raging across the industrialized world with financial, energy and communications systems covertly under constant threat. At the same time, the dependence on data integrity and the reliability of critical infrastructures, particularly cyber physical systems in the military, is growing in importance by the day.
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 14
- Next Page »