5,991 Results for:Protocol
- Sort by:
CISA: Akira ransomware extorted $42M from 250+ victims
19 Apr 2024The Akira ransomware gang, which utilizes sophisticated hybrid encryption techniques and multiple ransomware variants, targeted vulnerable Cisco VPNs in a campaign last year. Read More
Infrastructure requirements for Kubernetes cluster networking
01 Apr 2024A well-architected network infrastructure is vital for Kubernetes cluster networking, providing seamless communication and resource orchestration across containerized workloads. Read More
The pros and cons of quantum networking
18 Oct 2023Quantum networking, which is based on quantum physics, offers secure, high-speed communication. Challenges of quantum networking include fragility, costs and integration. Read More
Former Google engineer charged with stealing AI trade secrets
07 Mar 2024Linwei Ding, a Chinese national, allegedly evaded Google's data loss prevention systems and stole confidential information to start his own China-based AI company. Read More
The differences between inbound and outbound firewall rules
07 Mar 2024Firewalls can support both inbound and outbound firewall rules, but there are important differences between the two. Learn more about each and their uses. Read More
Demystifying the top five OT security myths
25 Oct 2023Goh Eng Choon, president of ST Engineering’s cyber business, outlines the common myths around OT security in a bid to raise awareness of the security challenges confronting OT systems Read More
Fuzzy about fuzz testing? This fuzzing tutorial will help
22 Mar 2024Organizations are searching for ways to automate and improve their application security processes. Fuzz testing is one way to fill in some of the gaps. Read More
BACnet IoT building automation devices vulnerable to attack
13 Aug 2019A security researcher has revealed that internet-connected building automating devices using the BACnet communication protocol are vulnerable to cyber attack Read More
NVMe-over-TCP brings super-fast flash over standard IP networks
14 Nov 2019TCP is the latest transport protocol that can be used to connect NVMe flash storage. We explain how NVMe-over-TCP works and the key advantages for datacentre customers Read More
How to use Wireshark to sniff and scan network traffic
29 Sep 2023Wireshark continues to be a critical tool for security practitioners. Learning how to use it to scan network traffic should be on every security pro's to-do list. Read More