412 Results for:DOS

  • Sort by: 

12 API security best practices to protect your business

By Michael Cobb 18 Oct 2022

As with any software development cycle, API security must be built in from the start. Follow these guidelines to design, deploy and protect your APIs. Read More

How to delete a Git repository

By Cameron McKenzie 29 Nov 2021

Trying to delete a local Git repository but the DVCS system still persists? Here's a quick example of how to locally remove a Git repo permanently and completely. Read More

Nostalgia marketing explained: Everything you already know

By Ben Lutkevich 27 Oct 2023

Nostalgia marketing is not a new idea, but it changes throughout the generations. Learn what it is and why it can be a successful strategy in the right context. Read More

Millions of devices at risk from NAME:WRECK DNS bugs

By Alex Scroxton 13 Apr 2021

Newly disclosed set of nine DNS vulnerabilities puts over 100 million consumer, enterprise and industrial IoT devices at risk Read More

Why companies should make ERP security a top priority

By Kevin Beaver 19 Apr 2022

Whether your ERP system is on premises or in the cloud, it's still vulnerable, and you need to take the right measures to secure it. Here's advice on how to do just that. Read More

7 TCP/IP vulnerabilities and how to prevent them

By Sharon Shea 13 Jan 2020

While many TCP/IP security issues are in the protocol suite's implementation, there are some vulnerabilities in the underlying protocols to be aware of. Read More

NFS vs. CIFS vs. SMB: What are the differences?

By Garry Kranz, Marc Staimer, Carol Sliwa 29 Mar 2023

There are stark differences among file sharing protocols NFS, CIFS and SMB. Compare access, application deployment, configuration and security, among other key features. Read More

SentinelOne discusses the rise of data-wiping malware

By Arielle Waldman 11 Aug 2022

During a Black Hat 2022 session, researchers showed how expectations of cyber war may differ from the reality. Read More

Forescout reports 33 new TCP/IP vulnerabilities

By Alexander Culafi 08 Dec 2020

The lack of consistent updates (and the open source nature of the stacks) make the Amnesia:33 vulnerabilities difficult to fix as well as make it difficult to comprehend the full impact. Read More

Bernard Brode

Bernard Brode is a nanotechnology researcher and cryptography consultant.Read More