December 29, 2017
AWS customers were enticed by products and services introduced at the cloud provider’s annual customer and partner confab, re:Invent, held recently. AWS also kept up a steady pace of basic service ...
September 20, 2017
The native iOS 11 email app has a bug that won't let it send email for users of Outlook.com, Office 365 and Exchange 2016 on Windows Server 2016.
August 18, 2017
Bloggers examine WatchGuard firewall appliances, explore transparency as a vendor virtue and assess the role of 5G in future SD-WAN deployments.
April 28, 2017
News roundup: A cybersecurity executive order overdue, but 'close and nearby.' Plus, the USPTO says it will stop using HTTPS; a teenage hacker sentenced to prison; and more.
HTTP Get Started
Bring yourself up to speed with our introductory content
Using REST APIs with Python can offer storage administrators increased flexibility in their management tasks, but they need some knowledge of how to code. Continue Reading
Expert Gerie Owen explains what it means to test APIs and why it is important to ensure that applications are working at peak performance level. Continue Reading
HTTP response header configuration files on servers need to be set up properly to secure sensitive data. Expert Judith Myerson outlines how to do this on different types of servers. Continue Reading
Evaluate HTTP Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
After introducing HTTP Public Key Pinning to the internet two years ago, the upcoming Chrome will replace it with the Expect-CT header. Matt Pascucci explains the switch. Continue Reading
New load-balancing options from AWS control traffic according to administrator needs, which increasingly revolve around hybrid cloud workloads. Continue Reading
Google's use of HTTP Strict Transport Security aims to improve web browsing security. Expert Judith Myerson explains how HSTS can make the internet more secure. Continue Reading
Learn to apply best practices and optimize your operations.
A recent patching issue with Flash drew attention to shortcomings with Adobe's HTTP security headers. Judith Myerson discusses the importance of HTTP header security. Continue Reading
I need a persistent cloud application deployment in which the Azure VMs' IP addresses remain the same after a restart or failure. Continue Reading
HEIST, a new HTTP/2 protocol exploit, can steal encrypted content from HTTPS traffic. Expert Michael Cobb explains how this attack works and how to stop it. Continue Reading
Problem Solve HTTP Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
SQL injection attacks threaten enterprise database security, but the use of cloud services can reduce the risk. Here's a look at some alternative SQL injection protection methods. Continue Reading
HTTP security headers that have the right configurations can be used as defense methods against cyberattacks. Expert Judith Myerson outlines how to use headers this way. Continue Reading
A vulnerability in Rufus software put some enterprise systems at risk. Expert Judith Myerson explains the flaw and the available fixes for organizations. Continue Reading