126 Results for:ACL

  • Sort by: 

Stateful vs. stateless firewalls: Understanding the differences

By Michael Cobb 18 Apr 2024

Stateful firewalls are the norm in most networks, but there are still times where a stateless firewall fits the bill. Learn how these firewalls work and what approach might be best. Read More

How do I manage ACL folder permissions with a PowerShell script?

By Anthony Howell 19 Sep 2019

PowerShell scripts make short work of repetitive Windows tasks, saving admins time, effort and frustration. One simple area admins can manage with scripts is the access control list. Read More

AWS security groups vs. network ACLs and other AWS firewalls

By Ofir Nachmani 18 Dec 2019

Protect your AWS cloud environment with these Amazon firewall services. Learn how security groups and network ACLs work, along with other key AWS firewall options. Read More

Using bounded context for effective domain-driven design

By Priyank Gupta 14 Feb 2024

Domain-driven design helps organizations develop software focused on key business needs. But to do so, architects need to understand the fundamentals of bounded context. Read More

How to map security gaps to the Mitre ATT&CK framework

By Kyle Johnson, Packt Publishing 10 Jul 2023

Mapping security gaps to the Mitre ATT&CK framework enables SOC teams to prioritize, remediate and eliminate vulnerabilities before malicious actors exploit them. Read More

What are 3 top Google Cloud Storage limitations?

By Brien Posey 05 Sep 2023

While Google Cloud Storage has several limitations, these three are among the most prevalent -- but users have straightforward ways to get around them. Read More

Cook Islands schools to get wired broadband

By Aaron Tan 21 Sep 2023

Schools in the Cook Islands, which have been relying on satellite connectivity for teaching and learning, will get access to wired broadband via two Pacific submarine cables over the next three years Read More

Reveal Windows file server permissions with PowerShell's help

By Anthony Howell 03 Mar 2023

An unauthorized permissions change on a file share could lock out other users. Learn how to automate a report that shows permissions on the server to find these problems fast. Read More

Onapsis researchers detail new SAP security threats

By Arielle Waldman 09 Aug 2023

At Black Hat 2023, Onapsis researchers demonstrated how attackers could chain a series of SAP vulnerabilities impacting the P4 protocol to gain root access to a target network. Read More

Openwall patches 3 of 6 Exim zero-day flaws

By Arielle Waldman 02 Oct 2023

The Openwall Project urged users to upgrade to the latest version of Exim, but there have been timely patching struggles with the message transfer agent software in the past. Read More