Learn Search

Search across all Learn content

Editorial

Expressions & POVs

Expert takes, practical perspectives, and opinionated security narratives.

MongoDB – Merging Data into an Existing Document

Point of View

MongoDB – Merging Data into an Existing Document

The world is huMONGOous, as is the amount of data we possess.

Mar 21, 2016 • 4 min read

Information and Communications Technologies (ICT) Strategic Partnership, An Overview

Point of View

Information and Communications Technologies (ICT) Strategic Partnership, An Overview

Partnerships and strategic alliances between technology vendors and Managed Service Providers (MSP) drive sales and bring success to technology firms and their partners. MSPs have played a significant role in taking a vendor’s product or service to the customers.

Mar 13, 2016 • 3 min read

Better Manageability and Operational Efficiency Through Saner’s Multi-Tenant Architecture

Point of View

Better Manageability and Operational Efficiency Through Saner’s Multi-Tenant Architecture

Multi-tenant architecture refers to the mode of operation wherein a single instance of a software application attends to multiple tenants. Each client is called a tenant. They may represent enterprises that gained access to the multi-tenant application or the multiple applications competing for intr...

Mar 08, 2016 • 3 min read

The Worst Data Security Breaches Till 2015

Point of View

The Worst Data Security Breaches Till 2015

Mar 02, 2016

Critical bug in glibc affecting millions of Linux applications

Point of View

Critical bug in glibc affecting millions of Linux applications

Feb 17, 2016 • 3 min read

Corporate Espionage – What Is It and Why Should We Be Worried

Point of View

Corporate Espionage – What Is It and Why Should We Be Worried

Corporate Espionage is the practice of stealing and unauthorized revealing of corporate data to other companies, government or individuals.

Feb 07, 2016 • 4 min read

Improving Security Through Best Practice for Businesses

Point of View

Improving Security Through Best Practice for Businesses

Jan 31, 2016 • 3 min read

Security Predictions – What’s In Store For 2016?

Point of View

Security Predictions – What’s In Store For 2016?

2016 Security Predictions

Jan 10, 2016 • 3 min read

5 Endpoint Security Myths

Point of View

5 Endpoint Security Myths

5 Endpoint Security Myths

Dec 28, 2015 • 3 min read