Technical Blog


Technical and Product News and Insights from Rackspace

Introduction to SAP Security Audit Log

This post introduces SAP® Security Audit Log.

Read More

Secure Active Directory authentication for Weblogic Server

This post explains how to secure Microsoft® Active Directory® (AD) authentication by using Secure Sockets Layer (SSL).

Read More

How to achieve PCI compliance in the public cloud

The Payment Card Industry Data Security Standard (PCI DSS) is a globally recognized regulation that protects consumer credit card information from theft and disclosure. It applies to all organizations that store, process, or transmit credit card information—even if it’s just a few transactions each year.

Read More

Threat Intelligence and security practices in the Oracle Cloud

The Oracle® Cloud Security Practices team, in their own words, “describe how Oracle protects the confidentiality, integrity, and availability of customer data and systems that are hosted in the Oracle Cloud and/or accessed when providing Cloud services. Today, 430,000 customers in 175 countries use Oracle technologies to seize business opportunities and solve real, tangible challenges.

Read More

Rackspace Cloud Native Security

In 2009, over 12 million malware infections were reported globally. By 2018, this increased to over 812 million detected threats. The sophistication of these attacks multiplies rapidly—it’s a nearly impossible task to be on top of security threats without having a dedicated team to manage and operate the effort. Security threats come in many different forms. For example, cybercrime has increased by 600% due to the COVID19 outbreak. Very few would have predicted a pandemic would open us to more cybercrime.

Read More

The SSL and TLS handshake process

This post introduces Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, how these protocols work, and why you might use them.

Read More

Hurdles and success criteria of DevSecOps adoption

DevSecOps integrates security practices, principles, tooling, and knowledge into all stages of the software development life cycle within an Agile framework. It aims to enforce security in every stage of the DevOps process compared to the traditional practice, where security assurance is typically performed late in the software delivery life cycle.

Read More

Salesforce and multifactor authentication

In today’s world, where everything we do seems to be virtual and online, threats that compromise security to your login credentials grow more common. That said, it’s important to employ strong security measures to protect your personal and business applications. That’s why you should consider implementing multi-factor authentication (MFA)—it helps to prevent common attacks such as phishing, keyloggers, and brute force attacks.

Read More

Use an AnyConnect certificate and OTP-based authentication

Certificate-based authentication is one of the most secure methods that Cisco AnyConnect provides to enable you to access VPN remotely with a one-time password (OTP).

Read More

DoH—toward more privacy

The Domain Name System (DNS) serves as the address book for the internet. Because they built DNS with scalability and consistency in mind, the developers did not consider how it could be exploited, manipulated, misused, or even harnessed for good.

Read More