5,991 Results for:Protocol

  • Sort by: 

How concerned should I be about a padding oracle attack?

By Hanno Böck 25 Mar 2019

Padding oracle attacks have long been well-known and well-understood. Find out how they work and why using modern encryption protocols can reduce the risks. Read More

Microsoft discloses wormable SMBv3 flaw without a patch

By Alexander Culafi 11 Mar 2020

Microsoft disclosed a new remote code execution vulnerability associated with the Microsoft Server Message Block 3.1.1 (SMBv3) protocol, but there's currently no patch available. Read More

Coalition: Insurance claims for Cisco ASA users spiked in 2023

By Arielle Waldman 24 Apr 2024

Coalition urged enterprises to be cautious when using Cisco and Fortinet network boundary devices as attackers can leverage the attack vectors to gain initial access. Read More

What role does CXL play in AI? Depends on who you ask

By Adam Armstrong 29 Mar 2024

CXL has struggled to find its place in AI, given competing Nvidia components. But some argue the interconnect could help companies get the most out of their GPUs. Read More

NCSC updates warning over hacktivist threat to CNI

By Alex Scroxton 02 May 2024

The NCSC and CISA have warned about the evolving threat from Russia-backed hacktivist threat actors targeting critical national infrastructure, after a number of American utilities were attacked Read More

Expert guide to e-discovery

By Martin Nikel 23 Jan 2024

An expert guide to why your organisation needs an electronic discovery policy and how to go about creating one Read More

6 types of quantum network topologies

By Venus Kohli 13 Dec 2023

Quantum networks require efficient architectures to optimize communication and enable large-scale quantum information processing. Learn about the main quantum network topologies. Read More

PUT vs POST: What's the difference?

By Cameron McKenzie 21 Aug 2023

What's the difference between PUT and POST methods? Here we compare POST versus PUT in terms of idempotence, URL usage, payloads and their use in RESTful APIs. Read More

Top 15 email security best practices for 2024

By Sharon Shea, Peter Loshin 31 Jan 2024

Attackers exploit email every day to break into corporate networks, but the risk can be reduced by adhering to these 15 email security best practices. Read More

'Rapid Reset' DDoS attacks exploiting HTTP/2 vulnerability

By Alexander Culafi 10 Oct 2023

Cloudflare said the Rapid Reset DDoS attack was three times larger than the attack it had on record. Google similarly called it 'the largest DDoS attack to date.' Read More