127 Results for:4DOS

  • Sort by: 

DoS vs. DDoS: How they differ and the damage they cause

By Ravi Das 05 Mar 2024

DoS and DDoS attacks may not be new, but that doesn't mean they are any less disruptive to organizations. Companies should understand what they are and how they work. Read More

Explore mitigation strategies for 10 LLM vulnerabilities

By Nihad Hassan 06 Mar 2024

As large language models enter more enterprise environments, it's essential for organizations to understand the associated security risks and how to mitigate them. Read More

4 key unified communications security threats to watch for

By Kevin Tolly 18 May 2023

Keeping your unified communications system safe requires tools that are specifically geared to voice and video apps. Learn how to take a multilayered approach to UC security. Read More

What are the elements of modern network security architecture?

By Amy Larsen DeCarlo 10 Jul 2023

Modern network security is a mix of several elements, including secure access service edge, virtualization technologies, segmentation and zero-trust models. Read More

10 types of security incidents and how to prevent them

By TechTarget Contributor, Alissa Irei 12 Jan 2024

Cyberattacks are more varied and numerous than ever. Learn the key signs of common security incidents and how to respond to keep systems and data safe. Read More

Top 6 SOAR use cases to implement in enterprise SOCs

By Andrew Froehlich, Jessica Groopman 17 Jan 2024

Automating basic SOC workflows with SOAR can improve an organization's security posture. Explore six SOAR use cases to streamline SOC processes and augment human analysts. Read More

Onapsis researchers detail new SAP security threats

By Arielle Waldman 09 Aug 2023

At Black Hat 2023, Onapsis researchers demonstrated how attackers could chain a series of SAP vulnerabilities impacting the P4 protocol to gain root access to a target network. Read More

7 AI meeting assistants to consider in 2024

By Beth Schultz 08 Mar 2024

AI meeting assistants are packed with powerful features to improve employee productivity and meeting workflows. So, which AI tool is best for your organization? Read More

Top 11 cloud security challenges and how to combat them

By Sharon Shea 29 Apr 2024

Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. Read More

How to rank and prioritize security vulnerabilities in 3 steps

By Mike Chapple 29 Jan 2024

Vulnerability management programs gather massive amounts of data on security weaknesses. Security teams should learn how to rank vulnerabilities to quickly fix the biggest issues. Read More