The Latest in IT Security

Posts Tagged ‘Technologies’

Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your security best practices are coming along for the ride. Cybercriminals don’t take vacations. In fact, they feast on tourists and travelers, taking advantage of people when […]

Read more ...

Email security vendor Sendio has patched a pair of remotely exploitable security bypass vulnerabilities in its Sendio ESP, or Email Security Platform, product. Researchers at Core Security Technologies reported the vulnerabilities March 26 to Sendio, along with a proof of concept that triggers the bug. Sendio version 6 (14.1120.0) is affected by this bug, and […]

Read more ...

Akamai #technologies analyzed thousands of #ddos attacks as well as nearly millions of #web application #attack triggers across the Akamai Edge #network. Q1 2015 set a record for the number of DDoS attacks – more than double the number recorded in Q1 2014 – and a jump of more than 35 percent compared to last […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments