The ONUG community has followed the progression of digital transformation since digital transformation became a thing. Now, as enterprises undertake this...
Category - Security
What is the average lifespan of malicious domains, and what are the typical causes of their deaths?
Those were some of the questions Paul Vixie was...
Using a few PowerShell commands for Active Directory, you can streamline your administrative approach to managing groups in the enterprise.
Active Directory is...
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Space-based IoT connectivity via nanosatellites helps...
Dave Kennedy is renowned in the security industry as a co-author of Metasploit: The Penetration Tester’s Guide (No Starch Press, July 2011). The...
Buyer’s Guide
View All Guide Articles
Using criteria and comparison, expert Karen...
An industrial control system is essentially a collection of computers that monitor and control industrial systems. They make the world move and help with...
One of these things is not like the others.
The shift toward algorithms could lead to better information security. If only companies across industries could...
Beware of the gray hat hacker, survey warns
Close to 40% of security professionals either know, or have known, a legitimate security practitioner who has...
Joshua Franklin entered the voting technology space in 2004, when he helped the state of Georgia to fix, maintain and repair its 20,000 touchscreen...