Tag Archives: denial of service

A Reminder From Yahoo: Change (And Improve) Your Passwords

A Reminder From Yahoo: Change (And Improve) Your Passwords

On January 31, 2014, Yahoo announced that a major theft of mail account passwords had compromised an “ undisclosed number” of accounts. Writing from the Yahoo Tumblr blog, senior vice president in charge of Yahoo’s platforms and personalization products, Jay Rossiter, pointed out the attack was a result of a third-party database being compromised, and not…

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

Sophisticated Cybercrime The story reads as if it were pulled from the pages of a Tom Clancy novel: a collection of US banks suddenly starts receiving Distributed Denial of Service (DDoS) attacks that are carefully timed to re-strike just as their systems start to repair themselves. The attacks are carried out by waves of botnet…

Breaking The Mold: Why IT Veterans Can’t Resist The Cloud

Breaking The Mold: Why IT Veterans Can’t Resist The Cloud

Breaking the Mold: Why IT Veterans Can’t Resist the Cloud Like it or not, Cloud Computing has transformed the way we communicate; from online storage to social networking, server virtualization truly pushes the boundaries of what is possible in a digitized world. Yet it was only a few years ago that the cloud was merely…

Auto Scaling In Cloud Computing

Auto Scaling In Cloud Computing

Auto Scaling In Cloud Computing Cloud computing with its dynamic scaling feature which allows one to scale, that is to increase or decrease, the amount of resources depending on the demand has become a great boon for IT professionals everywhere. This is especially true for environments with very unpredictable traffic flow, like the whole internet…

How To Tackle Security Vulnerabilities In Hypervisor Based Cloud Servers

How To Tackle Security Vulnerabilities In Hypervisor Based Cloud Servers Virtualization brings numerous security issues apart from the enormous benefits and productivity. Most of the organizations are reluctant to migrate to the cloud just because of the massive security vulnerabilities of cloud computing. Hypervisor, which is used in any virtualization environment to elevate the virtual…

The Other Cloud Issue – Availability – And What You Can Do About It

The Other Cloud Issue – Availability – And What You Can Do About It

The Other Cloud Issue – Availability – And What You Can Do About It “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.”                 – Warren Buffett, legendary investor and one of the richest men in the world. Even as the…

Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified

Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified Researchers at North Carolina State university and University of Oregon have proposed a jaw-dropping price tag for performing heavy duty cloud computing task – as low as zero dollars. Experiments reveal that cloud-based web browsers can be exploited to hijack the underlying computational power, and that as…

Press Release: Q2 2012 FireHost Web Application Attack Report Shows Sharp Rise In SQL Injections

17 million cyber-attacks blocked between April and June by secure cloud hosting provider London, UK – July 24, 2012 – Secure cloud hosting company, FireHost, has today revealed the latest statistical analysis of attacks successfully blocked by its servers located at data centers in the US and Europe.  During the period of April to June 2012,…

Featured Writers

Top Viral Impact

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Cloud Security In The Workplace

Cloud Security In The Workplace

Workplace Cloud Security Our workplaces are changing and much of it for the better. Increased flexibility – pushed by cloud services – is behind many of the changes. Home working, increased collaboration – it’s all good, and it’s all delivering significant business benefits. We know that. That’s so 2013. But fewer than 10% of businesses…

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Sponsored Posts We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more exposure for…