Home Tags Security

Tag: Security

Securing Network Ports with Firewalld

Firewalld provides dynamic monitoring and management of firewalls in RHEL 7. It supports firewall networks or zones that define the trust level of network...

Blockchain Platform to Allow Interoperability and Privacy

R3 has launched a commercial version of its open source blockchain platform Corda to provide privacy and security solutions The launch of Corda Enterprise by...
Advertisement

Top Open Source Tools for Network Security: The Old and the...

Data security vulnerabilities can result in tremendous losses, damage to reputation, and even national security threats. In this article, we discuss the top open...

Cross-Origin Resource Sharing (CORS): A Primer

For security reasons, browsers restrict cross-origin HTTP requests. If the coder is not aware of this or forgets about it, it can be pretty...

Installing the Red Hat Identity Management Server

Computer security is best achieved by allowing access to authorised users only. Red Hat Identity Management is a means of centrally setting up the...

10 Best Practices to Follow for Android Application Security

Mobile phones enable us to do almost everything online—from any place and at any time. As mobile activities are soaring, and digital activities are...
Advertisement

Demystifying Blockchains

A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography to ensure data security. Data security is...

How to Identify Fumbling to Keep a Network Secure

Repeated systematic failed attempts by a host to access resources like a URL, an IP address or an email address is known as fumbling....

What You Should Know about Open Source Licensing

FOSS is intellectual property and therefore is an asset that should be protected. The owner of the FOSS has a right to decide and...

“Cloud Adoption is Increasing But There Are A Lot of Security...

The cyber world is evolving at a fast pace. But alongside the growth, ensuring security is becoming a major challenge for companies offering cyber...
Advertisement

Block title