Category: Security

Keeping safe

How WordPress Websites Get Hacked

Your website is like a home – secure if you take the appropriate precautions, but vulnerable to burglars if you don’t. In the website world, however, sites don’t get burgled, they get hacked. The number of sites that get hacked...

/ June 29, 2019

WordPress Vulnerability Roundup: June 2019, Part 1

New WordPress plugin and theme vulnerabilities were disclosed during this month, so we want to keep you aware. We divide the WordPress Vulnerability Roundup into four different categories: 1. WordPress core 2. WordPress Plugins 3. WordPress Themes 4. Breaches From...

/ June 15, 2019

Which vSphere CPU Scheduler to Choose

The release of vSphere 6.7 Update 2 brought with it a new vSphere CPU scheduler option, the Side-Channel Aware Scheduler version 2 (SCAv2) or “Sibling Scheduler.” This new scheduler can help restore some performance lost to CPU vulnerability mitigations, but...

/ May 15, 2019

Magento GDPR: 7 Steps to Protect your Store (and your Customers)

After decades of loose online legislation and abstract digital data guidelines, the Wild Western days of the internet are ending. User privacy and data protection are frequently debated issues, especially with the recent concerns regarding morally questionable social media practices....

/ May 2, 2019

What is 2 Factor Authentication and How Can It Be Useful?

You may have heard how important 2 factor authentication (also known as two-factor authentication or 2FA) is for securing your online accounts. Don’t be embarrassed if you find yourself asking “What is 2 factor authentication?” Don’t worry, not knowing puts...

/ April 26, 2019

What you missed in cybersecurity this week

It’s been a busy week — it’s tough to keep up with all the cybersecurity news. We’ve collected some of the biggest cybersecurity stories from the week — from TechCrunch and afar — to keep you up to date with...

/ April 22, 2019

Building a Secure Data Center that You Can Carry in a Backpack with vSphere 6.7

Mobile data centers in the field help modern military forces stay connected and execute their missions. Cubic Mission Solutions works with VMware to deliver lightweight systems for the U.S. military and its allies that are truly portable, easy to use,...

/ April 17, 2019

Updates to VM Compatibility and VMware Tools with vSphere 6.7 Update 2

Note: vSphere 6.7 Update 2 was recently announced and will soon be generally available as an update and download. With VMware Tools version 10.0 VMware took the decision to separate it’s release cycle from that of vSphere. On that note...

/ April 9, 2019

vSphere Platinum 6.7 Update 2 Brings New Visualizations, Capabilities, and Security Features

The release of vSphere 6.7 Update 2 was announced (and will soon be generally available as an update and download), bringing improvements and fixes to all editions of vSphere. This includes vSphere Platinum 6.7 Update 2, the premier edition of...

/ April 3, 2019

Announcing vSphere 6.7 Update 2, vSphere Platinum updates, and vSphere ROBO Enterprise

I am excited to share that today we are announcing the VMware vSphere 6.7 Update 2 release, with key enhancements that will deliver an efficient and more secure hybrid cloud platform to our customers. We are also announcing the new...

/ April 2, 2019

How to Install Memcached (Caching Server) on CentOS 7

Memcached is an open source distributed memory object caching program that allows us to improve and speed up the performance of dynamic web applications by caching data and objects in Memory. Memcached is also used to cache entire database tables...

/ March 28, 2019

How to Secure a Website With the ‘Holy Trinity’ of Site Security

No matter how large or small your site is, or what niche it occupies, it’s likely to be the target for at least a few attacks over its lifespan. Protecting it is essential if you want to avoid losing data...

/ March 28, 2019

How to Setup Two Factor Authentication for SSH on Fedora

Every day there seem to be lots of security breaches reported where our data is at danger. Despite the fact that SSH is a secure way to establish a connection remotely to a Linux system, but still, an unknown user...

/ March 20, 2019