results matching 
 results
If you follow any form of tech media, you rarely go more than a day or two without hearing about some sort of data breach and its impact on business.
Understanding and quantifying information security risks lies at the heart of many security issues. If you can’t quantify risks, you can’t address how to protect your data assets, corporate secrets, and employees’ and customers’ privacy and information.
An organization’s data is everything because it gives market and customer insight. Data tells you where the market is going, where your customers are going, and where your company is going.
Cloud security is complex. Some people have admirable recall, but things are bound to be forgotten.
A disaster recovery (DR) plan is a series of instructions that leads your organization through the process of restoring operations following an unplanned event that prevents the use of its IT infrastructure.
Most Linux distributions install with running network services which listen for incoming connections from the internet, the loopback interface, or a combination of both.
Despite what many may think, a data leak isn’t the result of a cyber-attack. In fact, it’s the opposite.
Cybersecurity continues to be a challenge as adversaries come up with new and innovative ways to penetrate computer networks and steal data.
Cloud providers, hardware vendors, and software developers have teamed up to tackle data-in-use security issues. The result is a security model called confidential computing.
The days where software developers wrote their application code in isolation of any security implications are over.
As long as there have been personal computers, there have been cyber attacks, even in the pre-Internet days of the 1980s.
Security starts with having a well-protected network. This means keeping intruders out, and continuously scanning for potential breaches and flagging attempted compromises.
Application security testing products come in two basic groups and you need more than one. The umbrella groups: testing and shielding.
As developers release their code more quickly, security threats have become more complex, more difficult to find, and more potent in their potential damage to your networks, your data, and your corporate reputation.
The Why Security Automation is Needed for Today’s Modern Business guide discusses the need for automating application security.
What is Docker? Docker is a set of platform as a service (PaaS) products that use OS-level virtualization to deliver software in packages called containers.
What is cPanel? cPanel is a web hosting control panel that provides the simple and effective management of a web hosting server and typically runs on Linux.
What is ModSecurity? ModSecurity is a free and open source web application that started out as an Apache module and grew to a fully-fledged web application firewall.
What is phpMyAdmin? phpMyAdmin is a free, open source, and cross platform PHP-based web application that offers a simple, powerful and convenient browser based GUI for interacting and working with MySQL databases.
What is a LAMP Stack? LAMP is a very common example of a web service stack, named as an acronym of the names of its original four open-source components: the Linux operating system, the Apache HTTP Server, the MySQL relational database management system, and the PHP programming language.
Anti-virus and Rootkit Detection This guide teaches you how to use ClamAV, ClamTK, and rkhunter for anti-virus and rootkit detection to secure your server.
Keeping your system up-to-date with the latest packages and security updates can be a tedious task.
Fail2Ban is an intrusion prevention framework written in Python that protects Linux systems and servers from brute-force attacks.
There’s a good chance you’ve been using SSH (Secure Shell) to access your Linode from your computer.
What is Fail2Ban Fail2ban is a log-parsing application that monitors system logs for symptoms of an automated attack on your Linode.
Bummer! The page you were looking for wasn't found. You can browse our articles or try searching.