412 Results for:DOS
- Sort by:
Install Calico for Kubernetes in this video walkthrough
12 Jun 2023In this video tutorial and demo, a DevOps engineer explains how to manage network traffic in Kubernetes clusters with Calico, a Container Network Interface plugin. Read More
15 server and networking interview questions and answers
25 Jan 2024When interviewing for server and networking job positions, most interviewers look for knowledge in three main areas: servers, systems design and networking. Read More
How to fix the top 5 API vulnerabilities
11 Apr 2023APIs are more ubiquitous than ever, but many are still subject to well-known and often easily preventable vulnerabilities. Read More
Ripple20 vulnerabilities forebode long-lasting IoT risks
29 Jun 2020Organizations that use IoT devices at risk from the Ripple20 vulnerabilities must secure them through patching, network segmentation and zero trust. Read More
It's time to rethink security certification for OT devices
28 Oct 2022Security certifications don't protect OT devices from vulnerable processes and insecure-by-design practices. It's time to update security certs for the connected OT age. Read More
Comparing macOS vs. Windows security
09 Aug 2021Windows and macOS have their pros and cons and, often, security comes down to the individual use case. Read More
Apache Cassandra vulnerability puts servers at risk
16 Feb 2022Certain non-default configurations of the Apache Cassandra database software could leave the door open for remote code execution attacks, according to JFrog researchers. Read More
SonicWall patches 11 firewall vulnerabilities
22 Oct 2020SonicWall users are advised to download updates that fix 11 CVEs in the SonicOS operating system, uncovered by Positive Technologies Read More
Learn how to set up Windows Server 2022 SMB compression
15 Jul 2022Microsoft added SMB compression to the new server OS to reduce bottlenecks when transferring files with Windows-based file shares. Read More
Develop an effective unified communications security plan
31 Jul 2020A complete unified communications security plan requires an understanding of threats to UC systems, how to mitigate them and how to proactively address long-term security needs. Read More