412 Results for:DOS
- Sort by:
The HTML5 vulnerabilities enterprises need to know
14 Sep 2017Adobe Flash's end of life is coming, but there are some HTML5 vulnerabilities enterprises should be aware of before making the switch. Expert Judith Myerson outlines the risks. Read More
Open source virtualization expands VM hardware and OS options
16 Apr 2019Dive into open source virtualization software with VirtualBox, KVM or QEMU. Each offers customizable VM management capabilities and legacy hardware support. Read More
CIO interview: Niall Quinn, technology director, Crown Commercial Service
04 Oct 2018The Crown Commercial Service’s technology director talks about how the government’s procurement agency is working to make buying easier, drive innovation forward and shake up the public sector Read More
Women in code series: Allison Wilbur, Sauce Labs
05 Aug 2019The Computer Weekly Developer Network (CWDN) and Open Source Insider team want to talk code and coding. But more than that, we want to talk coding across the diversity spectrum… so let’s get the ... Read More
Radware: DDoS amplification attacks increasing, evolving
05 Apr 2019As DDoS attacks continue to evolve, planning for DDoS attack prevention and mitigation has become a critical business priority. Radware's Daniel Smith offers advice. Read More
Security Think Tank: The security role of SDN, containers, encryption and SDP
09 Jan 2019How can organisations combine software-defined networking, containerisation and encryption to prevent rogue code from running freely across a corporate network? Read More
Government is open for business, says SME Crown Representative
02 Nov 2018The government’s Crown Representative for SMEs, Emma Jones, sheds light on her three-pronged approach to increase spend with smaller businesses Read More
Security Think Tank: Five elements of a key cyber risk indicator
08 Mar 2019What should be the key cyber security risk indicator for any business? Read More
NIST offers a handy vendor-neutral overview of zero trust architecture
15 Oct 2019Curious about zero trust but don’t understand it yet or how to achieve it, then NIST is here to help you. Read More
CW@50: How UK home brew gave computing to the masses
13 May 2016From batch processing to the graphical user interface, from desktop PCs to smartphones, from luggables to wearables, computing has come a long way since Computer Weekly was first published in 1966. We look at some ... Read More