5,991 Results for:Protocol

  • Sort by: 

CISA: Akira ransomware extorted $42M from 250+ victims

By Alexander Culafi 19 Apr 2024

The Akira ransomware gang, which utilizes sophisticated hybrid encryption techniques and multiple ransomware variants, targeted vulnerable Cisco VPNs in a campaign last year. Read More

Infrastructure requirements for Kubernetes cluster networking

By Charles Uneze 01 Apr 2024

A well-architected network infrastructure is vital for Kubernetes cluster networking, providing seamless communication and resource orchestration across containerized workloads. Read More

The pros and cons of quantum networking

By Venus Kohli 18 Oct 2023

Quantum networking, which is based on quantum physics, offers secure, high-speed communication. Challenges of quantum networking include fragility, costs and integration. Read More

Former Google engineer charged with stealing AI trade secrets

By Arielle Waldman 07 Mar 2024

Linwei Ding, a Chinese national, allegedly evaded Google's data loss prevention systems and stole confidential information to start his own China-based AI company. Read More

The differences between inbound and outbound firewall rules

By Michael Cobb, Kevin Beaver 07 Mar 2024

Firewalls can support both inbound and outbound firewall rules, but there are important differences between the two. Learn more about each and their uses. Read More

Demystifying the top five OT security myths

By Aaron Tan 25 Oct 2023

Goh Eng Choon, president of ST Engineering’s cyber business, outlines the common myths around OT security in a bid to raise awareness of the security challenges confronting OT systems Read More

Fuzzy about fuzz testing? This fuzzing tutorial will help

By Ed Moyle 22 Mar 2024

Organizations are searching for ways to automate and improve their application security processes. Fuzz testing is one way to fill in some of the gaps. Read More

BACnet IoT building automation devices vulnerable to attack

By Warwick Ashford 13 Aug 2019

A security researcher has revealed that internet-connected building automating devices using the BACnet communication protocol are vulnerable to cyber attack Read More

NVMe-over-TCP brings super-fast flash over standard IP networks

By Eric Ebert 14 Nov 2019

TCP is the latest transport protocol that can be used to connect NVMe flash storage. We explain how NVMe-over-TCP works and the key advantages for datacentre customers Read More

How to use Wireshark to sniff and scan network traffic

By Ed Moyle 29 Sep 2023

Wireshark continues to be a critical tool for security practitioners. Learning how to use it to scan network traffic should be on every security pro's to-do list. Read More