days
0
-35
-3
hours
0
-9
minutes
-5
0
seconds
-2
-8
search

#security

How to build a secure system from scratch

Docker and Security: How do they fit together?

While Docker images are famously simple and practical, Docker security remains a tricky maze. Docker pros Dustin Huptas and Andreas Schmidt show us the essential security features you need to know for building a secure system with Docker.

Debunking common vendor security claims

Myths and realities behind security analytics

Security software vendors tend to exaggerate the potential of their tools – to put it mildy. Using real-world attack examples, Niara’s Karthik Krishnan explains why so many enterprise systems are being breached and what cyber security technology is really capable of.

Establishing a BYOD strategy

The impact of BYOD on the enterprise

Many enterprise IT organisations experienced the rapid introduction of mobile and cloud within their environments. New challenges such as BYOD and the Internet of Things (IoT) brought about new demands and a rapid pace driving enterprises to simplify and retool IT infrastructure.

Five tips to stay secure

Common threats to your VoIP system

VoIP remains a popular system for telephone communication in the enterprise. But have you ever considered the security holes this system is leaving you open to? And what company secrets are at risk of eavesdropping, denial of service and “Vishing” attacks?

Software: "What else can I eat?"

Why everything is code

Ops, hardware, infrastructure – software is still eating its way into various worlds that were once out of its reach. Meanwhile DevOps is eating up the developer’s workplace. Perforce’s Mark Warren speaks to us about the impact of everything becoming code and how DevOps is changing responsibility, security and collaboration.

Layers of security

Using ZeroMQ Security (Part 2)

ZeroMQ is a high-performance asynchronous messaging library, suitable for use in scalable distributed or concurrent applications. Pieter Hintjens is here to explain how to use its security layers in your own applications.

Layers of security

Using ZeroMQ Security (Part 1)

ZeroMQ is a high-performance asynchronous messaging library, suitable for use in scalable distributed or concurrent applications. Pieter Hintjens is here to explain how to use its security layers in your own applications.