The Latest in IT Security

Posts Tagged ‘brief summary’

Major file sharing sites have freaked out, closing down or locking their gates to keep out U.S. IP addresses following the FBI’s Megaupload takedown over the weekend. Since Saturday, when the file-sharing company’s founder, Kim Dotcom, was tossed into a New Zealand jail, similar sites have been taking unprecedented steps to avoid a similar fate. […]

Read more ...

27
Oct
2011

Last week, we announced our IPAbuseCheck lookup tool. We see lots of infected/abusive hosts on the Internet attempting to proxy abusive web transactions through our proxies. Rather than just ignoring these transactions, we’ve decided to provide this lookup utility for security professionals and organizations to query and identify abusive/infected hosts within their networks – based […]

Read more ...

This seems to be my week for flagging password-related blogs. Well, there are plenty of stolen password issues around. So here's a blog in stark contrast to Urban Schrott's blog about good password practice in Ireland (which I expanded on here and here). Troy Hunt ran an analysis of the subset of stolen Sony Pictures […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments