412 Results for:DOS
- Sort by:
Securing AI during the development process
25 Jan 2022AI systems can have their data corrupted or 'poisoned' by bad actors. Luckily, there are protective measures developers can take to ensure their systems remain secure. Read More
3 key questions to ask about unified communications security
10 Sep 2019Unified communications security can be tricky. Learn how to craft a strategy that addresses security challenges and the requirements of individual UC tools. Read More
Cisco warns of new IOS flaws
21 May 2007The new flaws are classified as "low," but if exploited they could result in a sustained DoS condition, Cisco said. Read More
The risks of silent patching and why it must end
29 Dec 2021Silently patching vulnerabilities within TCP/IP software is a detrimental, yet common habit among security vendors that hinders the security posture of the cybersecurity community. Read More
Top expert advice addresses unified communications strategy
31 Dec 2019The ways to approach unified communications strategies are always evolving. Check out the advice our industry experts gave to answer the top UC strategy questions of 2019. Read More
A glossary of 10 essential network security terms
02 Jul 2019This network security glossary covers both old and new key terms -- such as zero trust networks and microsegmentation -- that can bolster anyone's security vocabulary. Read More
How can SAP Work Zone for HR help enable a digital workplace?
20 Jan 2021Part of SAP SuccessFactors HXM, Work Zone for HR is a digital workspace meant to boost employee experience. Learn more about its features and functions. Read More
What role does SBC security play in VoIP protection?
19 Nov 2018Knowing which SBC security features are essential is important to stave off potential attacks. Our expert gives insight into what features are necessary for robust protection. Read More
VoIP migration requires telephony network planning, security scrutiny
09 Aug 2019A PBX to VoIP migration requires careful planning to ensure call quality. Learn how to ready the network, evaluate architecture options and set the right security policies. Read More
Zoom vulnerability reveals privacy issues for users
12 Jul 2019Companies and users around the world were impacted by a Zoom conferencing software flaw that could allow threat actors to forcibly join a video call without interaction. Read More