5,993 Results for:Protocol

  • Sort by: 

How SPF records prevent email spoofing, phishing and spam

By Peter Loshin 25 Aug 2022

Forged email has long been used by hackers to break into protected systems. Learn how the Sender Policy Framework protocol helps stop spoofing, phishing and other malicious mail. Read More

Using SSH tunneling for good and evil

By Peter Loshin 07 Jun 2022

Secure Shell tunneling takes the secure application protocol to the next level for bypassing firewalls and creating secure connections everywhere. Read More

Golden SAML: How can it abuse SAML authentication protocol?

By Nick Lewis 14 Jun 2018

CyberArk researchers created an attack called Golden SAML that uses Mimikatz techniques and applied it to a federated environment. Learn more about the attack with Nick Lewis. Read More

DataStax extends Astra Streaming event data platform

By Sean Michael Kerner 29 Jun 2022

The data platform vendor extended its Apache Pulsar-based Astra Streaming platform with support for more streaming protocols, including Kafka, JMS and RabbitMQ. Read More

How will the new WPA3 protocol strengthen password security?

By Michael Cobb 04 May 2018

The development of WPA3 helps advance Wi-Fi protocol, as the next generation of Wi-Fi-enabled devices begins to demand more. Expert Michael Cobb explains how it differs from WPA2. Read More

FBI, DHS blaming the victims on Remote Desktop Protocol

By Peter Loshin 01 Oct 2018

FBI, DHS call on users to mitigate Remote Desktop Protocol vulnerabilities and handle RDP exploits on their own, even as the "going dark" campaign continues unabated. Read More

How does DNSChanger take advantage of WebRTC protocols?

By Judith Myerson 01 Feb 2017

WebRTC protocols are being targeted by a new version of the DNSChanger exploit kit. Judith Myerson explains how these attacks work and what enterprises should know. Read More

How to secure Kubernetes clusters in 7 steps

By Prateek Singh 08 Apr 2022

Kubernetes security is critical for an enterprise's welfare. To protect Kubernetes clusters, create a plan to implement security protocols and control access. Read More

3 ways IoT developers can tackle a changing design landscape

08 Apr 2022

Supply chain interruptions, chip shortages and new networking protocols make IoT product design an ever-evolving process. Here's how developers can address these challenges. Read More

How to implement OpenID Connect for single-page applications

By Kyle Johnson, Manning Publications Co. 04 Apr 2022

The OpenID Connect authentication protocol can be used to secure a variety of applications. This excerpt teaches developers how it works with single-page applications. Read More