April 14, 2015
Part 2 of our series shows you how to secure services such as FTP, Apache HTTP server and outgoing e-mail server (SMTP).
April 2, 2015
This two-part tutorial will cover all the services and potential vulnerabilities to help you keep your server safe.
March 31, 2015
With all the buzz surrounding IoT, it's fair to assert we are in the midst of another shift in computing. Learn more about what's to come.
March 26, 2015
Learn how to leverage IdentityServer3 to lock down your SSO efforts.
March 16, 2015
Learn why exposing services through the proper APIs is crucial.
March 3, 2015
Learn more about why Ansible is a valuable tool that provides a coherent model for safely provisioning, configuring and orchestrating multiple remote machines.
January 28, 2015
Learn more about the process of project management and its goals and specific challenges.
December 18, 2014
Ronnie Mitra reviews the security standards that have risen to the top of the heap. If you are designing a web API in 2015, these are the ones you should be staying on top of and implementing.
October 30, 2014
POODLE means finally getting rid of IE 6 once and for all.
September 30, 2014
Learn more about the different steps and tools employed to protect Big Data applications.
September 1, 2014
Learn more about ZAP—a penetration test and vulnerability assessment tool written in Java.
August 12, 2014
Will the Internet of Things wither on the vine?
August 7, 2014
Development project failures and the subsequent re-work are well-known issues. Learn more about how the Cost of Poor Quality (CoPQ) is largely a controllable entity.
July 2, 2014
The final installment in this tutorial series will show you how to secure, store and display the video surveillance data.
June 5, 2014
Learn how to read the video stream you set up in the first part of this tutorial and accept it at the remote location.