Featured Stories

Latest Stories

How to move your WordPress blog to Azure VM (Part 2 of 4)

Install WordPress on VM in Azure We continue our 4 part series on how to move your WordPress Blog to Azure VM. Please read Part 1 of this series if …

How to move your WordPress blog to Azure VM (Part 1 of 4)

In this multipart series, we will look at how you can move your existing, self-hosted WordPress blog to Azure. While there are many ways to create a WordPress in Azure …

February 22, 2016

LoadMasterESP

Pre-Authentication with AAD Domain Services in Azure

As new features are added to the public cloud, we need to continuously re-analyze the products we use to see what we are able to take advantage of. Recently, Microsoft …

February 17, 2016

Kemp Default Blog Image

Top 15 consideration before deploying Skype for Business Server 2015 in your Environment

Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …

February 15, 2016

Microsoft DirectAccess Remote Access (VPN) with Windows 10 and Server 2012

UPDATE: If you currently use DirectAccess, we recommend that you investigate the newer Microsoft Always On VPN functionality. For more information on load balancing Microsoft’s recommended solution read Application Experience for …

December 16, 2015

OWASP Top Ten Series: Missing Function Level Access Control

Missing Function Level Access Control What is the vulnerability? Web applications typically only show functionality that a user has the need for and rights to use in the UI on …

December 9, 2015

Kemp Default Blog Image

KEMP Technologies – The only Visionary ADC Vendor

This month marked an exciting milestone for KEMP, and for me personally, as CEO of the company. Gartner published the 2015 Magic Quadrant for Application Delivery Controllers on October 6, …

October 20, 2015

Cross-Site-Scripting

OWASP Top Ten Series: Cross Site Scripting

Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …

October 13, 2015

Kemp Default Blog Image

OWASP Top Ten Series: Security Misconfiguration

Security Misconfiguration Modern web applications are built from many different parts. There are front end components such as a web browser, a desktop application with embedded web viewer, or increasingly …

August 11, 2015