412 Results for:DOS

  • Sort by: 

The HTML5 vulnerabilities enterprises need to know

By Judith Myerson 14 Sep 2017

Adobe Flash's end of life is coming, but there are some HTML5 vulnerabilities enterprises should be aware of before making the switch. Expert Judith Myerson outlines the risks. Read More

Open source virtualization expands VM hardware and OS options

By Jack Wallen 16 Apr 2019

Dive into open source virtualization software with VirtualBox, KVM or QEMU. Each offers customizable VM management capabilities and legacy hardware support. Read More

CIO interview: Niall Quinn, technology director, Crown Commercial Service

By Lis Evenstad 04 Oct 2018

The Crown Commercial Service’s technology director talks about how the government’s procurement agency is working to make buying easier, drive innovation forward and shake up the public sector Read More

Women in code series: Allison Wilbur, Sauce Labs

By Adrian Bridgwater 05 Aug 2019

The Computer Weekly Developer Network (CWDN) and Open Source Insider team want to talk code and coding.  But more than that, we want to talk coding across the diversity spectrum… so let’s get the ... Read More

Radware: DDoS amplification attacks increasing, evolving

By Mekhala Roy 05 Apr 2019

As DDoS attacks continue to evolve, planning for DDoS attack prevention and mitigation has become a critical business priority. Radware's Daniel Smith offers advice. Read More

Security Think Tank: The security role of SDN, containers, encryption and SDP

By Paddy Francis 09 Jan 2019

How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Read More

Government is open for business, says SME Crown Representative

By Lis Evenstad 02 Nov 2018

The government’s Crown Representative for SMEs, Emma Jones, sheds light on her three-pronged approach to increase spend with smaller businesses Read More

Security Think Tank: Five elements of a key cyber risk indicator

By Mary-Jo de Leeuw 08 Mar 2019

What should be the key cyber security risk indicator for any business? Read More

NIST offers a handy vendor-neutral overview of zero trust architecture

By Kyle Johnson 15 Oct 2019

Curious about zero trust but don’t understand it yet or how to achieve it, then NIST is here to help you. Read More

CW@50: How UK home brew gave computing to the masses

By Cliff Saran 13 May 2016

From batch processing to the graphical user interface, from desktop PCs to smartphones, from luggables to wearables, computing has come a long way since Computer Weekly was first published in 1966. We look at some ... Read More