Keep up to date on current trends and technologies
Web - Web Security
![Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks?](https://uploads.sitepoint.com/wp-content/uploads/2024/03/1711553178fortress-300x300.jpg)
Building a Digital Fortress: How to Strengthen DNS Against DDoS Attacks?
Beloslava Petrova
![Create Your Own VPN Server in 10 Minutes with Vultr & OpenVPN](https://uploads.sitepoint.com/wp-content/uploads/2022/04/1651111457vpn-a-300x158.jpg)
Create Your Own VPN Server in 10 Minutes with Vultr & OpenVPN
SitePoint Sponsors
![How to Get Started with Your Website Content Security Policy](https://uploads.sitepoint.com/wp-content/uploads/2016/03/1494530099authentication-300x200.jpg)
How to Get Started with Your Website Content Security Policy
Craig Buckler
![Your Domain Name: Do You www or Not?](https://uploads.sitepoint.com/wp-content/uploads/2014/10/1414667201Fotolia_57424548_Subscription_Monthly_M-Small-300x200.jpg)
Your Domain Name: Do You www or Not?
Craig Buckler
![Why Every Website Needs HTTPS](https://uploads.sitepoint.com/wp-content/uploads/2017/04/1492683680padlock-300x200.jpg)
Why Every Website Needs HTTPS
Jeff Smith
![Shared Server Hosting: the Pros and Cons](https://uploads.sitepoint.com/wp-content/uploads/2016/10/1475909933server-cogwheel-300x193.jpg)
Shared Server Hosting: the Pros and Cons
Craig Buckler
![Dedicated Server Hosting: the Pros and Cons](https://uploads.sitepoint.com/wp-content/uploads/2016/10/1475909933server-cogwheel-300x193.jpg)
Dedicated Server Hosting: the Pros and Cons
Craig Buckler
![Keybase: Sending, Receiving and Sharing Encrypted Messages](https://uploads.sitepoint.com/wp-content/uploads/2016/12/1480599115keybase-thumb-300x201.jpg)
Keybase: Sending, Receiving and Sharing Encrypted Messages
Ardian Haxha
![How to Prevent Replay Attacks on Your Website](https://uploads.sitepoint.com/wp-content/uploads/2016/08/1471413237replay-feature-300x200.jpg)
How to Prevent Replay Attacks on Your Website
Ben Dickson
![4 Major Technical Challenges Facing IoT Developers](https://uploads.sitepoint.com/wp-content/uploads/2016/07/1672802490iot-300x150.jpg)
4 Major Technical Challenges Facing IoT Developers
Ben Dickson
![Why the Internet of Things Still Has a Long Way to Go](https://uploads.sitepoint.com/wp-content/uploads/2016/07/14692426191467609743IoTWeek_Gray-300x102-300x102.png)
Why the Internet of Things Still Has a Long Way to Go
Elio Qoshi
![Web Scraping for Beginners](https://uploads.sitepoint.com/wp-content/uploads/2016/05/1469248838scrape-300x200.jpg)
Web Scraping for Beginners
Shaumik Daityari
![Opera VPN: the Future of Private Browsing?](https://uploads.sitepoint.com/wp-content/uploads/2016/04/1469251285opera-300x200.jpg)
Opera VPN: the Future of Private Browsing?
Craig Buckler
Cyber-security and the Case For Really Good Train Sets
Alex Walker
The End of Passwords or Privacy? It’s Your Call
Alex Walker
Sending Secure, Encrypted Email with ProtonMail
Tanay Pant
Getting Started with Web Application Monitoring
Lukas White
How to Solve Caching Conundrums
Craig Buckler
Is Your Website’s Privacy Policy Putting You at Risk?
James Chiodo
![Quickly Detect Hacked Files via CRON/PHP: SuperScan](https://uploads.sitepoint.com/wp-content/uploads/2015/09/1672801503hacking-300x170.jpg)
Quickly Detect Hacked Files via CRON/PHP: SuperScan
DK Lynn
Improving Web Security with the Content Security Policy
Ian Oxley
Interview: How SitePoint Manages and Prioritizes Monitoring
Craig Buckler
Who’s in Charge of Protecting Your Cloud?
Pavlo Prystupa
How to Block Entire Countries from Accessing Your Website
Zack Wallace
The Beginner’s Guide to Being On-call
Adam Bolte
Would You Implement Passwordless Login?
Craig Buckler
Are FTP Programs Secure?
Matthew Setter
An Introduction to ChatOps: Devops Meets IM
Shaumik Daityari
Integrating VictorOps with Salesforce Using its REST Endpoint
Dhaivat Pandya
Surviving in the Age of Internet Pirates
Kerry Butters
5 Steps to Uncovering Your IT Security Gaps
Nazar Tymoshyk
Asset Access Restriction Methods – Block Unwanted Visitors
Jeroen Meeus
Showing 32 of 76