results matching 
 results
The Domain Name System (DNS) is the directory that underlies the global Internet. However, it provides no assurance that online sites are what they claim to be, or that the information they provide is valid.
Making your web application portfolio used to be a lot easier, back when web servers, and web pages themselves, were relatively simple constructions.
Security is an important issue for all web applications and databases, especially those using the Structured Query Language (SQL).
Application security testing tools help you build applications that are less vulnerable to attacks by automating security testing, and by verifying your applications are secured against known vulnerabilities.
Cryptography is a cornerstone of modern secure communication practices. From digital signatures to disk encryption, these everyday applications of cryptography enable users of the Internet, developers, and business to keep sensitive data private.
If you follow any form of tech media, you rarely go more than a day or two without hearing about some sort of data breach and its impact on business.
Understanding and quantifying information security risks lies at the heart of many security issues. If you can’t quantify risks, you can’t address how to protect your data assets, corporate secrets, and employees’ and customers’ privacy and information.
An organization’s data is everything because it gives market and customer insight. Data tells you where the market is going, where your customers are going, and where your company is going.
Cloud security is complex. Some people have admirable recall, but things are bound to be forgotten.
A disaster recovery (DR) plan is a series of instructions that leads your organization through the process of restoring operations following an unplanned event that prevents the use of its IT infrastructure.
Most Linux distributions install with running network services which listen for incoming connections from the internet, the loopback interface, or a combination of both.
Despite what many may think, a data leak isn’t the result of a cyber-attack. In fact, it’s the opposite.
Cybersecurity continues to be a challenge as adversaries come up with new and innovative ways to penetrate computer networks and steal data.
Cloud providers, hardware vendors, and software developers have teamed up to tackle data-in-use security issues. The result is a security model called confidential computing.
As long as there have been personal computers, there have been cyber attacks, even in the pre-Internet days of the 1980s.
The days where software developers wrote their application code in isolation of any security implications are over.
Security starts with having a well-protected network. This means keeping intruders out, and continuously scanning for potential breaches and flagging attempted compromises.
Application security testing products come in two basic groups and you need more than one. The umbrella groups: testing and shielding.
The Why Security Automation is Needed for Today’s Modern Business guide discusses the need for automating application security.
As developers release their code more quickly, security threats have become more complex, more difficult to find, and more potent in their potential damage to your networks, your data, and your corporate reputation.
What is Docker?Docker is a set of platform as a service (PaaS) products that use OS-level virtualization to deliver software in packages called containers.
What is cPanel?cPanel is a web hosting control panel that provides the simple and effective management of a web hosting server and typically runs on Linux.
What is ModSecurity?ModSecurity is a free and open source web application that started out as an Apache module and grew to a fully-fledged web application firewall.
What is phpMyAdmin?phpMyAdmin is a free, open source, and cross platform PHP-based web application that offers a simple, powerful and convenient browser based GUI for interacting and working with MySQL databases.
What is a LAMP Stack?LAMP is a very common example of a web service stack, named as an acronym of the names of its original four open-source components: the Linux operating system, the Apache HTTP Server, the MySQL relational database management system, and the PHP programming language.
Anti-virus and Rootkit DetectionThis guide teaches you how to use ClamAV, ClamTK, and rkhunter for anti-virus and rootkit detection to secure your server.
Keeping your system up-to-date with the latest packages and security updates can be a tedious task.
Fail2Ban is an intrusion prevention framework written in Python that protects Linux systems and servers from brute-force attacks.
There’s a good chance you’ve been using SSH (Secure Shell) to access your Linode from your computer.
What is Fail2Ban Fail2ban is a log-parsing application that monitors system logs for symptoms of an automated attack on your Linode.
Bummer! The page you were looking for wasn't found. You can browse our articles or try searching.
This section shows how to implement security best practices that all users should consider implementing.