Inside Azure Cloud Switch (ACS), Microsoft’s Own Linux Distro

In case you haven’t heard, Microsoft loves Linux. Recent news around Redmond’s new modular Linux-based operating system for datacenter networking have been making the rounds, but for those in the know—the announcement is hardly a surprise. ...

Unpacking The New WinRAR Vulnerability

Users of the highly popular Windows-based compression/decompression utility WinRAR be warned: a newly-discovered vulnerability could allow remote attackers to compromise Windows systems by exploiting a remote code execution (RCE) flaw. ...

[Infographic] 7 Ways to Hack Ruby on Rails and Prevention Tips

Ruby-on-Rails—it’s modular, expressive, and broadly supported by legions of loyal developers. From Twitter to GroupOn, many of the world’s most trafficked websites have relied on Rails to deliver scalable and highly available web services. ...

7 Ways To Hack Oracle + Java Web Apps And How To Fix Them

Java—love it or hate it, it isn’t going anywhere. Despite being hailed as “the biggest vulnerability for US computers” by CSO magazine, it’s currently back in pole position as the most popular developer language on the market. Of course, ...

10 Steps For Improving IIS Security

Microsoft Internet Information Server (IIS) is widely used in the enterprise, despite a less-than-stellar reputation for security. In fact, for many “IIS security” is a contradiction of terms—though in all fairness, Microsoft's web server ...

[Infographic] 11 Weird And Wonderful Uses For Docker

Docker may not be the solution to ending world hunger, but the recent myriad of strange and remarkable use cases for it might have you thinking otherwise. From managing Rasberry Pi clusters to facilitiating genome sequencing and cancer ...

[Infographic] 10 Ways to Bolster Apache Web Server Security

According to Netcraft’s 2015 web server statistics, 47.7% of all websites are using Apache—making it the most popular web server in the world. Ubiquity has its price, however: the open source project is under the constant scrutiny of both ...

[Infographic] Top 20 OWASP Vulnerabilities And How To Fix Them

The Open Web Application Security Project (OWASP) is a well-established organization dedicated to improving web application security through the creation of tools, documentation, and information—that latter of which includes a yearly top ...

[Infographic] Top 10 Critical CVEs That Can Lead To A Data Breach And How To Fix Them

A typical organization’s environment consists of a myriad of applications and services, each with its own unique set of ongoing vulnerabilities and flaws that could ultimately lead to a data breach. This can make IT security and ...

Top 10 Java Vulnerabilities And How To Fix Them

Java consistently gets a bad rap when it comes to security—but considering half of enterprise applications in the last 15 years were written with the language, its pervasiveness (and commonly-known attack vectors) may be more to blame than ...

Docker vs VMWare: How Do They Stack Up?

This is a clash of virtualization titans: one virtual machine, the other a containerization technology. In reality, both are complementary technologies—as hardware virtualization and containerization each have their distinct qualities and ...

[Infographic] Top 10 Windows 10 Vulnerabilities and How to Fix Them

Genuine Windows 7 or Windows 8/8.1 owners are in for a pre-holiday treat from Microsoft: a free upgrade to Windows 10, no strings attached. Security-conscious users will appreciate some new features that enable better security—namely ...

[Infographic] Top 10 Ways to Secure Your Windows Environment

Windows 10 made its debut back in July and has since garnered some generally positive reviews, though the release hasn’t been without its share of vulnerabilities. For IT and operations, this means (begrudgingly) supporting/hardening ...

Infrastructure as Code Showdown: Terraform vs. CloudFormation

When we speak of the DevOps and continuous delivery/integration (CI/CD) toolchain, we’re referring to a superset of tools—many with overlapping capabilities—for helping organizations achieve faster and safer deployment velocity.  This ...

Top 10 Django Security Vulnerabilities And How To Fix Them

Popular high-level Python framework Django is widely lauded for its ease-of-use and pragmatic design, but like all software it is susceptible to its own share of critical vulnerabilities. Built completely with Python, the MVC framework has ...

Open Source Puppet vs Puppet Enterprise: Which Is Right For You?

So you’ve done your research and settled on Puppet as your configuration management (CM) and automation tool of choice. But it comes in 2 flavors: a commercial enterprise product and a free open-source version. Can free beat fee in this ...

Getting Started with Docker (Part 2 of 2)

Part One of Getting Started with Docker introduced some features of the Docker solution that make it unique from VMs and other comparable technologies. In this follow-up article, we’ll take a look at how UpGuard works with Docker ...

FireEye vs Tripwire

Heavy hitters FireEye and Tripwire are unique contenders in the security offering lineup– both were the first to develop novel approaches to IT security that have since been emulated industry-wide: FireEye was an early innovator of ...

Could This Be The Ultimate DevOps Dashboard?

Many enterprise software hopefuls tackle the final stretch to becoming a mature offering through the development of an easy-to-use management GUI. This is especially true of DevOps and automation tools, as quite a few solutions have ...

FireEye vs Palo Alto Networks WildFire

Despite seeming like somewhat of a no-brainer, using the power of the cloud to combat cloud-based security threats has really only come into vogue recently. As organizations continue to move their infrastructures out of physical data ...
All posts