The Latest in IT Security

Posts Tagged ‘loopholes’

Brett Cove from SophosLabs in Vancouver presented his talk, “Following the tracks: understanding snowshoe spam”, at the Virus Bulletin 2011 conference in Barcelona this morning. While there has been a lot of press about botnets being shutdown resulting in lower volumes of spam reaching our gateways, there has been very little discussion about tackling “snowshoe” […]

Read more ...

It has only been 21 days since the Facebook Bug Bounty Program was announced and yet the company has already paid a total of $40,000 to bounty hunters. The program’s aim is to strengthen Facebook’s defense against attacks by fixing bugs within the system. Their strategy is to entice security researchers with the promise of […]

Read more ...

So you bought insurance against a data breach. With all the potential loopholes and variables, is it worth the cost for the coverage required to handle a real-world scenario? That’s a tender subject these days at Sony. In light of their recent breaches, soaring near an estimated $180 million, it seems their insurance provider, Zurich […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments