Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
Security
Total 369 articles
Protect your online presence with our expert articles and tutorials on security tools and practices. Stay up-to-date on the latest antivirus software, DDoS prevention strategies, and how to keep your personal and professional assets safe from cyber threats. SQL Injections, and WAF.
There might be situation while working in a Middleware team where Oracle WebLogic environment setup is done by someone else, or you don’t know the password, but you have the server access.
An Incident Report is a crucial record that maintains track of occurrences and aids in the improvement of the customer experience. It is often used in software development, customer service, and other sectors.
Secure your industrial infrastructures from cyber threats using operational technology (OT) security best practices. Explore its importance, learning resources, and more.
Anycast routing is one of the many approaches used in fighting DDoS attacks. Learn how Anycast routing works and how effectively it fights DDoS attacks.
Want to deploy an effective strategy to save your organization from cyberattacks? Explore cyber resilience strategy, benefits, learning resources, and more.
Infrastructure-as-Code (IaC) is revolutionizing the face of modern IT infrastructure, making it more secure, cost-effective, and performance efficient.
Digital certificates are important for online security and privacy. Discover everything you need to know about X.509 certificates with this helpful guide!
Mobile device usage has increased massively in the last few years. And now it seems hard to imagine a life without these gadgets like smartphones, laptops 💻, tablets, and so on.
The traditional perimeters of networks have disappeared. Access to an organization’s applications and digital assets occurs from far places, and controlling those accesses becomes a serious challenge. The days when network borders could be protected are long gone. Now is the time for new zero-trust security strategies.
VPNs are a thing of the past. Zero-trust networks easily adapt to cloud, on-premises, or mixed environments and offer greater flexibility and security than VPNs. And lower costs.
Using the right software-defined perimeter (SDP) solution can help you secure your organizational assets and infrastructure from attackers and unauthorized users.
It’s interesting to watch who is initiating cyber-attacks against whom live, globally. Thousands of websites get hacked every day due to vulnerable files, plugins, and misconfiguration on the servers.
FTP is an acronym for file transfer protocol. FTP (file transfer protocol) is a mechanism for transferring files from one computer to another. It was developed in 1971.