7,031 Results for:layer

  • Sort by: 

Virtualization layer is HCI's secret sauce

By Robert Sheldon 21 Feb 2018

Knowing how virtualization software turns separate hardware components into pools of shared resources will help you plan and manage an HCI implementation. Read More

Five TLS comms vulnerabilities hit Aruba, Avaya switching kit

By Sebastian Klovig Skelton 03 May 2022

Five new vulnerabilities in the implementation of transport layer security communications leave several popular switches vulnerable to remote code execution Read More

Intel roadmap includes faster Optane SSDs, 144-layer NAND

By Carol Sliwa 30 Sep 2019

Intel Optane's 2020 roadmap features new "Alder Stream" SSDs that can sustain read I/O latency of 10 μs for at least 800,000 IOPS; 3D NAND flash plans include 144-layer SSDs. Read More

What’s the state of application layering in 2018?

By Bas van Kaam 02 Aug 2018

Application layering has arrived. Read More

Which should I choose? AWS Shield vs WAF vs Firewall Manager

By Ernesto Marquez 07 Sep 2022

AWS WAF focuses on Layer 7 protection, while Shield protects against DDoS attacks. Firewall Manager manages the protection. Learn their key features, pricing and use cases. Read More

How secure are one-time passwords from attacks?

By Kyle Johnson 06 Apr 2022

Adding an additional authentication layer makes it harder for attackers to get into accounts, but not all authentication factors are equal -- especially when it comes to OTPs. Read More

Solving IoT authentication challenges

17 Nov 2021

If organizations want to take advantage of IoT, they must first protect major authentication vulnerabilities with layers of defenses. Read More

How layered security can help and hinder application security

By Kevin Beaver 31 May 2018

The growth of technology includes the growth of layered security. Join expert Kevin Beaver as he explains the pros and cons of layered defenses for application security. Read More

Protection from ransomware requires layered backup, DR

By Paul Crocetti 17 May 2018

A strategy for protection and successful recovery from ransomware includes everything from monitoring tools to offline storage. Organizations should use multiple methods. Read More