Google Cloud Functions Similar to the popular Amazon Web Services (AWS) tool Lambda, the Google Cloud Platform has released its own service allowing developers to set up functions which are triggered in response to specific events – Google Cloud Functions.
Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly
High Cost of DDoS Attacks Distributed Denial of Service (DDoS) attacks involve the use of multiple compromised systems, often infected with a Trojan, to target a single system. The array of compromised systems flood the resources or bandwidth of their
Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli,
The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should
Worst Data Breaches Some of the worst data breaches have been revealed. We’ve mentioned before that with all the recent massive hacks on Sony, Microsoft, Home Depot, etc. companies are focusing more and more on the necessity of improved security
DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security
Challenges Of Cloud Computing Cloud computing challenges have always been there. Companies are increasingly aware of the business value that cloud computing brings and are taking steps towards transition to the cloud. A smooth transition entails a thorough understanding of