412 Results for:DOS

  • Sort by: 

How to build an incident response plan, with examples, template

By Paul Kirvan 22 Jan 2024

With cyberthreats and security incidents growing by the day, every organization needs a solid incident response plan. Learn how to create one for your company. Read More

4 cloud API security best practices

By Dave Shackleford 20 Mar 2023

APIs make up the majority of web traffic now, but they aren't always kept as secure as needed. Consider implementing these four cloud API security best practices. Read More

How and why businesses should develop a ChatGPT policy

By George Lawton 25 Jul 2023

ChatGPT-like tools have enterprise potential, but also pose risks such as data leaks and costly errors. Establish guardrails to prevent inappropriate use while maximizing benefits. Read More

Dedupe dos and don'ts: Data deduplication technology best practices

By W. Curtis Preston 18 Sep 2009

Learn best practices for implementing data deduplication into your backup system from backup expert W. Curtis Preston. Read More

Executive interview: DNS designer David Holtzman discusses net security

By Cliff Saran 16 May 2023

How is it possible for criminals to lure people onto fake websites? Holtzman says it’s because DNS is fundamentally insecure Read More

Top 5 benefits of SASE to enhance network security

By Terry Slattery 01 Aug 2023

A cloud-based distributed architecture, centralized management and endpoint-specific security policies are just some of the benefits of Secure Access Service Edge. Read More

It was 40 years ago today

By Simon Quicke 23 Sep 2022

Happy Birthday MicroScope! As the publication turns 40, we look back on where it began and what was making the headlines back in 1982 Read More

Carrier UCaaS services extend cloud communication benefits

By Irwin Lazar 10 Nov 2022

UCaaS is becoming more popular as carriers roll out more sophisticated and integrated packages to users. Learn why it might make sense to consolidate your vendors. Read More

What an email security policy is and how to build one

By Andrew Froehlich 30 Oct 2023

Companies must have an effective security policy in place to protect email from cybercriminals and employee misuse. Learn how to build one for your company. Read More

MPLS - Preparing an RFP (Dos and Don'ts)

28 Sep 2004

A look at the things to include in an RFP, a request for proposal for VPN service. Read More