412 Results for:DOS

  • Sort by: 

Securing AI during the development process

By John Burke 25 Jan 2022

AI systems can have their data corrupted or 'poisoned' by bad actors. Luckily, there are protective measures developers can take to ensure their systems remain secure. Read More

3 key questions to ask about unified communications security

By Katherine Finnell 10 Sep 2019

Unified communications security can be tricky. Learn how to craft a strategy that addresses security challenges and the requirements of individual UC tools. Read More

Cisco warns of new IOS flaws

21 May 2007

The new flaws are classified as "low," but if exploited they could result in a sustained DoS condition, Cisco said. Read More

The risks of silent patching and why it must end

29 Dec 2021

Silently patching vulnerabilities within TCP/IP software is a detrimental, yet common habit among security vendors that hinders the security posture of the cybersecurity community. Read More

Top expert advice addresses unified communications strategy

By Micah Levine 31 Dec 2019

The ways to approach unified communications strategies are always evolving. Check out the advice our industry experts gave to answer the top UC strategy questions of 2019. Read More

A glossary of 10 essential network security terms

By Michaela Goss 02 Jul 2019

This network security glossary covers both old and new key terms -- such as zero trust networks and microsegmentation -- that can bolster anyone's security vocabulary. Read More

How can SAP Work Zone for HR help enable a digital workplace?

By Luke Marson 20 Jan 2021

Part of SAP SuccessFactors HXM, Work Zone for HR is a digital workspace meant to boost employee experience. Learn more about its features and functions. Read More

What role does SBC security play in VoIP protection?

By Kevin Tolly 19 Nov 2018

Knowing which SBC security features are essential is important to stave off potential attacks. Our expert gives insight into what features are necessary for robust protection. Read More

VoIP migration requires telephony network planning, security scrutiny

By Katherine Finnell 09 Aug 2019

A PBX to VoIP migration requires careful planning to ensure call quality. Learn how to ready the network, evaluate architecture options and set the right security policies. Read More

Zoom vulnerability reveals privacy issues for users

By Michael Heller 12 Jul 2019

Companies and users around the world were impacted by a Zoom conferencing software flaw that could allow threat actors to forcibly join a video call without interaction. Read More