5,988 Results for:Protocol
- Sort by:
The latest video conferencing standards and protocols
24 Jan 2024A new crop of video conferencing standards could help boost performance, but not every standard will be adopted by every vendor. Read More
What are the most important email security protocols?
13 Oct 2023Email was designed without security considerations. Email security protocols, including SMPTS, SPF and S/MIME, add mechanisms to keep messaging safe from threats. Read More
Understanding protocol buffers vs. JSON
19 Oct 2023Protocol buffers have some compelling advantages over JSON when it comes to sending data between internal services. But is it really a replacement for JSON? Read More
Top 12 most commonly used IoT protocols and standards
12 Jul 2023Not every IoT communication protocol is right for every deployment or device. Consider the power and security requirements before choosing one protocol over another. Read More
12 common network protocols and their functions explained
16 May 2023Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are key for communication and connection across the internet. Read More
HPE brings multi-protocol Alletra storage to GreenLake
20 Apr 2023HPE's newest addition to its Alletra portfolio supports block, file and object protocols. It reflects a shift toward simplification and commoditization in storage hardware. Read More
How to use TFTP to transfer files across the network
19 Jan 2024Trivial File Transfer Protocol is one of the oldest and simplest TCP/IP file exchange protocols. Here are use cases and best practices for installation and security. Read More
How to deploy and configure xrdp on Linux
19 Apr 2024When organizations run Linux, they may need to link those systems to Windows via Remote Desktop Protocol. Learn how to set this up and what configuration options there are. Read More
Sophos: Ransomware present in 70% of IR investigations
03 Apr 2024Sophos' Active Adversary Report said securing remote desktop protocols and Active Directories and hardening credentials can help limit the influx of successful ransomware attacks. Read More
Apple unveils PQ3 post-quantum encryption for iMessage
21 Feb 2024Apple said its new PQ3 protocol for iMessage is the first of its kind and addresses both future threats from quantum computing as well as "harvest now, decrypt later" attacks. Read More