Can Flow Monitoring Work on Encrypted Traffic?
Encrypted traffic is on the rise. It's no longer possible to inspect the content of the communication. What does this mean for network traffic monitoring?
Sitefinity CMS 11.1 Now Includes Open Redirect Protection
The built-in redirect validation mechanism introduced in Sitefinity CMS 11.1 protects your website against Open Redirect vulnerabilities.
Ten Things for CIOs to Avoid When Considering High-Productivity/Low-Code Platforms
A high-productivity/low-code platform can speed development and let developers retain needed control. But with all the marketplace noise, where do you begin?
Mark Troester November 20, 2018
How to Detect and Stop Cryptomining on Your Network
If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking.
Is Running A Virtual Machine (VM) Worth The Effort?
In the computing world, virtualization by way of virtual machines is used to describe a method of avoiding the purchase of multiple physical computers or servers, one for each operating system.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation