5,988 Results for:Protocol

  • Sort by: 

The latest video conferencing standards and protocols

By Irwin Lazar 24 Jan 2024

A new crop of video conferencing standards could help boost performance, but not every standard will be adopted by every vendor. Read More

What are the most important email security protocols?

By Peter Loshin 13 Oct 2023

Email was designed without security considerations. Email security protocols, including SMPTS, SPF and S/MIME, add mechanisms to keep messaging safe from threats. Read More

Understanding protocol buffers vs. JSON

By Twain Taylor 19 Oct 2023

Protocol buffers have some compelling advantages over JSON when it comes to sending data between internal services. But is it really a replacement for JSON? Read More

Top 12 most commonly used IoT protocols and standards

By Mary K. Pratt 12 Jul 2023

Not every IoT communication protocol is right for every deployment or device. Consider the power and security requirements before choosing one protocol over another. Read More

12 common network protocols and their functions explained

By Michaela Goss 16 May 2023

Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are key for communication and connection across the internet. Read More

HPE brings multi-protocol Alletra storage to GreenLake

By Adam Armstrong 20 Apr 2023

HPE's newest addition to its Alletra portfolio supports block, file and object protocols. It reflects a shift toward simplification and commoditization in storage hardware. Read More

How to use TFTP to transfer files across the network

By Damon Garn 19 Jan 2024

Trivial File Transfer Protocol is one of the oldest and simplest TCP/IP file exchange protocols. Here are use cases and best practices for installation and security. Read More

How to deploy and configure xrdp on Linux

By Damon Garn 19 Apr 2024

When organizations run Linux, they may need to link those systems to Windows via Remote Desktop Protocol. Learn how to set this up and what configuration options there are. Read More

Sophos: Ransomware present in 70% of IR investigations

By Arielle Waldman 03 Apr 2024

Sophos' Active Adversary Report said securing remote desktop protocols and Active Directories and hardening credentials can help limit the influx of successful ransomware attacks. Read More

Apple unveils PQ3 post-quantum encryption for iMessage

By Alexander Culafi 21 Feb 2024

Apple said its new PQ3 protocol for iMessage is the first of its kind and addresses both future threats from quantum computing as well as "harvest now, decrypt later" attacks. Read More