4,999 Results for:IP

  • Sort by: 

Deception, proactive defenses can better protect IP, says expert

By Robert Westervelt 20 Nov 2012

Deceptive environments, phony data in the enterprise can fool attackers and increase the cost of hacking, says noted cybersecurity expert Paul Kurtz. Read More

Open source promises advantages for business applications

By Peter Ray Allison 11 Mar 2024

Open source software may provide a cost-effective approach to building business applications, as well as ensuring transparency, but there are challenges to keep in mind Read More

How to enhance FTP server security

By Stuart Burns 23 May 2019

If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just a few command prompts -- to keep them secure. Read More

Inadequate cloud logs are proving a headache for CISOs

09 Jan 2024

The mass adoption of cloud environments is pushing strained CISOs to the brink and a lack of attention to logging isn't helping. Vectra's Mark Wojtasiak calls for organisations to do more to improve visibility in ... Read More

5 common network services and their functions

By Andrew Froehlich 15 May 2023

DHCP, DNS, NTP, 802.1x, and CDP and LLDP are some of the most common services network administrators use to secure, troubleshoot and manage enterprise networks. Read More

Cisco working on fix for critical IOS XE zero-day

By Alexander Culafi 16 Oct 2023

Cisco designated the bug, CVE-2023-20198, with a CVSS score of 10 and said it was working on a patch, but advised customers to apply mitigations in the meantime. Read More

Amy Larsen DeCarlo

GlobalData

Amy Larsen DeCarlo is principal analyst at GlobalData. She primarily covers the managed security and cloud services industries.Read More

Secure Azure Functions with these authentication methods

By Liam Cleary 18 Sep 2023

Securing Azure Functions is paramount to maintaining the integrity and reliability of your applications. Read over the methods, tools and best practices. Read More

Arcitecta offers file and object storage with huge transfer rates

By Yann Serra, Antony Adshead 30 Apr 2024

Australian startup offers single namespace file and object storage with rapid access via a metadata database that puts the right data in the right place according to recent use Read More

How to use Wireshark to sniff and scan network traffic

By Ed Moyle 29 Sep 2023

Wireshark continues to be a critical tool for security practitioners. Learning how to use it to scan network traffic should be on every security pro's to-do list. Read More