Archive

Category: Security

Threats, hardening, privacy, and the operational side of securing software and infrastructure.

Security

The Data Motility Dilemma

There’s no question that cloud computing has major benefits for enterprises of all sizes. Storing data on virtual servers ensures flexibility in access, plenty…

Security

10 Interesting Ways to Use .htaccess

Many web servers use a configuration file called .htaccess that is based on the directory level. This file is used to provide decentralized management…