The Latest in IT Security

Posts Tagged ‘Network’

Most companies operate with a traditional perimeter security model, where the firewall guards a border. In a conventional setup, “inside the firewall” often means “safe.” The firewall protects the internal network from external access. You type a username and password into your device to authenticate and connect to a server on the network. That’s a […]

Read more ...

Akamai #technologies analyzed thousands of #ddos attacks as well as nearly millions of #web application #attack triggers across the Akamai Edge #network. Q1 2015 set a record for the number of DDoS attacks – more than double the number recorded in Q1 2014 – and a jump of more than 35 percent compared to last […]

Read more ...

Global telecommunications service provider and fibre optic subsea cable operator Pacnet has suffered a breach: unknown hackers have gained access to its corporate IT network last month. It’s interesting to note that the compromise happened prior to Telstra, Australia’s largest telecom and media company, finalizing its acquisition of Pacnet on on 16 April 2015. Read […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments