How to cache your website using NGINX and FastCGI in CentOS 7 with PHP FastCGI Process Manager PHP-FPM

Configure HTTP Basic Authentication on NGINX How to implement HTTP Basic Authentication in a NGINX web server to restrict access for your website users with a simple username/password challenge

In this guide we’ll see how we can implement a password-based authentication mechanism on our NGINX web servers using HTTP Basic Authentication: a simple auth method that allows webmasters to …

Read More
How to handle multipage TIFF files with ASP.NET C# (GDI+ alternative)
DevOps Methodology, Lifecycle and Best Practices explained

How to secure your CI/CD pipeline Three important security countermeasures you might want to implement to ensure that your CI/CD pipeline is as secure as it can be

It is widely known that the CI/CD pipeline is one of the most effective ways to work in software development. CI/CD provides an unmatched integration from start to finish for …

Read More
How to Remove Bing Redirect Virus From Your Mac

How to Remove Bing Redirect Virus From Your Mac If you are at your wit’s end trying to stop the intolerable Bing search rerouting activity on your Mac, this article will point you in the right direction

Bing, Microsoft’s famous search engine, is being heavily mishandled in a massive web traffic monetization campaign orchestrated by cybercriminals. Computers running macOS are in the epicenter of this plot. The …

Read More
Container e Containerization: cos'è e come funziona

4 Simple Steps to Build Continuous Security into Container Deployment A high-level, yet detailed look towards the various challenges and goals of container security during build, ship and run phases

In current times, container adoption has skyrocketed. The importance of securing the apps DevOps teams create and deploy using containers has grown along with it. The protection security teams must …

Read More
Is your Telemedicine or Contact Tracing App Secure enough?

Is your Telemedicine or Contact Tracing App Secure enough? A list of the key aspects in telemedicine and/or contact tracing mobile apps to check and secure against malicious threats

With the wake of COVID-19 lockdown, a sudden surge is seen in the usage of Telemedicine apps. The availability of the easier healthcare option where irrespective of the distance, a …

Read More
CSIRT vs SOC: What Are the Differences?

CSIRT vs SOC: What Are the Differences? The key differences between the two most common security teams: Security Operations Center (SOC) and Computer Security Incident Response Team (CSIRT)

An effective security strategy requires a solid team, best practices, tools, and technologies. Each organization applies these factors in a different way. Some companies can make do with a one …

Read More
Cybersecurity Trends to Know in 2019 [Infographic]