5,991 Results for:Protocol
- Sort by:
How concerned should I be about a padding oracle attack?
25 Mar 2019Padding oracle attacks have long been well-known and well-understood. Find out how they work and why using modern encryption protocols can reduce the risks. Read More
Microsoft discloses wormable SMBv3 flaw without a patch
11 Mar 2020Microsoft disclosed a new remote code execution vulnerability associated with the Microsoft Server Message Block 3.1.1 (SMBv3) protocol, but there's currently no patch available. Read More
Coalition: Insurance claims for Cisco ASA users spiked in 2023
24 Apr 2024Coalition urged enterprises to be cautious when using Cisco and Fortinet network boundary devices as attackers can leverage the attack vectors to gain initial access. Read More
What role does CXL play in AI? Depends on who you ask
29 Mar 2024CXL has struggled to find its place in AI, given competing Nvidia components. But some argue the interconnect could help companies get the most out of their GPUs. Read More
NCSC updates warning over hacktivist threat to CNI
02 May 2024The NCSC and CISA have warned about the evolving threat from Russia-backed hacktivist threat actors targeting critical national infrastructure, after a number of American utilities were attacked Read More
Expert guide to e-discovery
23 Jan 2024An expert guide to why your organisation needs an electronic discovery policy and how to go about creating one Read More
6 types of quantum network topologies
13 Dec 2023Quantum networks require efficient architectures to optimize communication and enable large-scale quantum information processing. Learn about the main quantum network topologies. Read More
PUT vs POST: What's the difference?
21 Aug 2023What's the difference between PUT and POST methods? Here we compare POST versus PUT in terms of idempotence, URL usage, payloads and their use in RESTful APIs. Read More
Top 15 email security best practices for 2024
31 Jan 2024Attackers exploit email every day to break into corporate networks, but the risk can be reduced by adhering to these 15 email security best practices. Read More
'Rapid Reset' DDoS attacks exploiting HTTP/2 vulnerability
10 Oct 2023Cloudflare said the Rapid Reset DDoS attack was three times larger than the attack it had on record. Google similarly called it 'the largest DDoS attack to date.' Read More