Why you should use Azure Resource Locks
Safeguard critical Azure resources with Resource Locks One of Public Cloud’s greatest assets is the ability to create and destroy resources at the drop of a hat. This modern approach to infrastructu...
Safeguard critical Azure resources with Resource Locks One of Public Cloud’s greatest assets is the ability to create and destroy resources at the drop of a hat. This modern approach to infrastructu...
Website performance is an increasingly important factor to pay attention to for both user experience and SEO purposes. Three key website performance metrics to focus your attention on are Largest Cont...
A database is the backbone of an application, storing, organising, and managing the data your application needs. There comes a point in the development of your application where the critical nature ne...
Massive security implications The extremely popular WordPress plugin Essential Addons for Elementor had website owners scrambling to update after a critical Stored Cross-Site Scripting (XSS) vulnerabi...
With the introduction of cloud-based, managed SQL server solutions, there are now more options than ever for running SQL Server. In this insight, we will dig into those options and see how their diffe...
Secret management software offers tools to help avoid plain text secrets and unencrypted storage of secrets. The increased adoption of DevOps principles and CI/CD plays a vital role in safeguarding co...
This is the seventh in our series of insights which seek to explore and simplify the topic of SSL (and TLS) in the context of web application hosting. In our previous insight, we looked at Web Server ...
This is the second in our series of insights that seek to explore and simplify the topic of SSL (and TLS) in web application hosting. In our previous insight, we looked at the basics of SSL/TLS with a...
This is the first in our series of insights which seek to explore and simplify the topic of SSL (and TLS) in the context of web application hosting. What is SSL? In the simplest terms, SSL and TLS pro...
Your website or application is frequently not just a representation of your brand; it’s the core of your business operations. These digital assets, from e-commerce platforms to SaaS applications...
Protecting sensitive information has become a top priority in today’s digital landscape. Secret management software offers tools to help avoid plain text secrets and unencrypted storage of secre...
Should I be worried? Well, this vulnerability is a biggy, with over 400,000 installations and allowing arbitrary file uploads, there will be a lot of compromised WordPress sites that use the affected...
Microsoft has decided to rename Azure Active Directory (AAD) to Microsoft Entra ID (As of this post’s writing, no acronym has been offered by Microsoft). This change reinforces Microsoft’s...
We’ve all been there. You’re sitting in a meeting, and someone casually mentions, “Is it just me, or is our website slow?“. The room goes silent for a moment, and everyone star...
WordPress, as prevalent as it is, running a massive 43% of the websites on the internet, will always have baddies poking a prodding for ways to put their malicious code/redirects/links/spam/emailing o...