Articles

Plug and Go  

Automation of network devices can be accomplished in a number of ways: with the official approaches recommended by the manufacturers; by Cumulus Linux, an open network operating system; and with the Ansible automation platform, which can communicate with devices from any vendor.

Cuckoo's Egg  

Wireshark and a combination of tools comprehensively analyze your security architecture.

Card Change  

In this overview, we look at the opportunities eSIM technology offers for the mobile workplace and what IT managers need to watch out for in deployment and management.

Cybersecurity Know-How  

The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.

Quick Shell  

Windows Terminal Preview comes with interesting new features, such as state-preserving quick windows access via shortcuts and configuration of almost all settings in a GUI, which is reason enough to take a look at the preview.

Salvage  

macOS on-board tools and third-party applications can help prevent the loss of files and make security and backup your first priority.

Key to Security  

Nitrokey hardware authentication devices aim to raise data encryption, key management, and user authentication security to the next level.

Stressed  

Generate load on servers and services with the Gatling load-testing tool.

Trustworthy  

DMARC combines the abilities of SPF and DKIM to safeguard and protect against spam and phishing and allows targeted configuration according to company policy.

Beyond the Patch  

Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles of modern zero trust concepts.