5 Ruby Tools and Extensions You Should Know

Ruby is a common programming language, ranked among the most popular in the world for tech startups, alongside Java, Python, SQL, and PHP. Many well-known applications and websites are built on Ruby, including Airbnb, Twitter, Kickstarter, CafePress, and Github. Ruby is an object-oriented language developed in the mid-1990s by Japanese creator Yukihiro “Matz” Matsumoto. Matz … Read more5 Ruby Tools and Extensions You Should Know

Top Monitoring and Optimization Tools for Docker

Docker is a multipurpose tool that can replicate many functions of a virtual machine with less of the hassle. Because Docker operates using virtual software packages (called “containers”) running from the same software kernel, Docker can help you reduce storage overhead while deepening the complex functions of your server. Using Docker can instantly allow for … Read moreTop Monitoring and Optimization Tools for Docker

Top 10 Active Directory Service Accounts Best Practices in 2019

With Windows Active Directory, a range of different account types can be set up with the necessary permissions, access, and roles. These include service accounts, which are intended for use when installing applications or services on the operating system. Common types of Active Directory service accounts include built-in local user accounts, domain user accounts, managed … Read moreTop 10 Active Directory Service Accounts Best Practices in 2019

4 Ways Cyberattackers Take Advantage of Mismanaged Permissions

If we’ve learned nothing else about cybercriminal organizations over the last few years, we know for certain these folks are experts on Microsoft security. They’re no longer simply opportunistically gaining access to your network; instead, they’re leveraging known vulnerabilities in operating systems and applications and using the very network they’ve compromised to assist them in finding their intended target … Read more4 Ways Cyberattackers Take Advantage of Mismanaged Permissions

Top 6 Active Directory Security Groups Best Practices in 2019

Active Directory is essentially a registry containing all the information about a network, including users, groups, computers and printers, and servers. Each of these things, whether physical or virtual, is considered an “object” in Active Directory, and has various attributes assigned to it, such as a name, number, or group membership. Active Directory is used … Read moreTop 6 Active Directory Security Groups Best Practices in 2019

RBAC vs. ABAC: What’s the Difference?

In any company, network users must be both authenticated and authorized before they can access parts of the system capable of leading to security breaches. The process of gaining authorization is called access control. In this guide, I discuss the two main methods for managing access control for your systems—role-based access control (RBAC) and attribute-based … Read moreRBAC vs. ABAC: What’s the Difference?

3 Ways Your Permissions Are in Worse Shape Than You Think

IT is really busy these days. In fact, IT’s been busy for as long as you can remember. Security issues today alone could keep you busy full-time, but there’s just not enough time in the day. Strategic initiatives and fires seem to take precedent daily, pushing some of the more necessary, but rudimentary, parts of … Read more3 Ways Your Permissions Are in Worse Shape Than You Think

What Is a Hypervisor? Hypervisor Definition, Types, and Examples

Hypervisors were created in 1965 to work with the IBM RPQ for the IBM 360/65. They were originally designed to test sharing systems between virtual machines and looking at new hardware concepts without jeopardizing the main production system. Now, hypervisors are commonly used to allocate physical hardware resources to virtual machines, which are known as … Read moreWhat Is a Hypervisor? Hypervisor Definition, Types, and Examples