Learn how you can leverage Liongard MSP solution to enable you to automate, standardize, and scale your MSP operations.
By Amakiri Welekwe
in Net Admin
on April 12, 2024
Learn how you can leverage VMware Workspace One unified endpoint management (UEM) tool to enable you to securely provision flexible workspaces for your employees
By Amakiri Welekwe
in Net Admin
on April 10, 2024
Cortex XSOAR is a platform that enables Palo Alto security systems to work with third-party tools to discover and block threats.
By Stephen Cooper
in Net Admin
on April 8, 2024
Browser hijacking is a type of malware that takes over your browser to make it do things you do not
By Jon Watson
in Information Security
on March 18, 2017
If you’re looking to get into ethical hacking, getting acquainted with Python is a great start. We discuss Python and ethical hacking and reveal the best online courses you can take to start training in the field.
By Aimee O'Driscoll
in Information Security
on December 7, 2023
Path traversal attacks may not get as much attention as other online attacks but they can be quite nasty. In this post, we look at how path traversal attacks work and how to prevent them.
By Marc Dahan
in Information Security
on November 15, 2023
Everything you need to know about the TLS protocol. This article covers what it is, how it works, its many different uses as well as its security problems.
By Josh Lake
in Information Security
on September 14, 2023