Microsoft announced a lot of Azure SQL news at Ignite this month, but few as critical to application development security than the public preview of Always Encrypted with secure enclaves. Here's how ...
Yes, it's possible to do a Microsoft Exchange Server deployment that is secure enough for all but the most sensitive information. Here's how to do it. With all the news about information leaks, ...
Read and learn about the most common SQL Server services running under your OS (operating system). Tibor writes about five SQL Server database types that each perform a specific role. He also provides ...
Welcome to the second part of our tutorial on how to set up and secure a multi-server CrowdSec Security Engine installation. In the first part, I walked you through the setup of CrowdSec Security ...
As your business grows, you may find that your Web serving needs quickly outpace simple single-server arrangements. If that's the case, you need to start planning a server farm. Part of that planning ...
Recent research from Verizon shows that 96% of social engineering attacks are done through email, and for that reason alone, you might want to consider adding extra security. Let’s discuss the ...
Securing your business website with HTTPS isn't just a good idea, it's a necessity. Google Chrome now marks HTTP payment and login pages and search pages as insecure if they're not using HTTPS.
Any Linux server distribution is a very powerful server that performs above and beyond what your business might need. Whatever task you throw at the server, it will be ready. And, if it isn’t ready ...
Read and learn about the most common SQL Server services running under your OS (operating system). Tibor writes about five SQL Server database types that each perform a specific role. He also provides ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results