Tutorials

security map digital encryption identity
thinkstock 500773792 cpu processor

security internet network encryption privacy padlock

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

Scrum Master Role Explained
video

The scrum master role explained

Watch this instructional video to understand how a scrum master can help a team learn agile development and follow a scrum process to develop new applications

petya ransomware logo

Petya ransomware and NotPetya malware: What you need to know now

NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.

authentication

What is SAML, what is it used for and how does it work?

The Security Assertion Markup Language (SAML) standard defines how providers can offer both authentication and authorization services. Here's what you need to know.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

Load More