The Latest in IT Security

Posts Tagged ‘hypotheses’

From mass WordPress compromises to a spear-phishing attack on the White House, there is no doubt cybercriminals gained confidence and momentum in 2012. The Websense Security Labs looked at recent security and attack trends to come up with hypotheses of the anticipated evolution of threats in 2013. Forecasting threats is a challenging task, especially when […]

Read more ...

It is relatively easy for illegitimate websites to “poison” Google search results and achieve a top-5 ranking. And it’s financially well worth their while. Last Friday, at the French CLUSIR/RSSIA conference, Frederic Roumat from EdelWeb (groupe ON-X) gave us an impressively argued demonstration on the subject. After Roumat exposed the methods to gain illegal traffic […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks