"In 2018, we would see a lot more deliberate actions by companies to augment security of their applications," says Parag Khurana, Managing Director, India and SAARC at F5 Networks.
With enterprises heavily depending on APIs for growth, API security has emerged as a business-critical component today. Tips to employ an effective API security framework.
In this article, Sophos describes the process they used to develop their models. To help explain the concepts, they worked through the development and evaluation of a toy model meant to solve the very real problem of detecting malicious URLs.
To date, our industry has mystified machine learning in secrecy and jargon. Transparency, explanation, and information is what is prefered. Please enjoy this guide – a collection of the articles we’ve shared throughout the year to tell the story.
From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major cyber attacks of 2017-2018 and what we can learn from them.
Over the last month alone, we have detected several large botnets designed to profit from concealed crypto mining. We have also observed growing numbers of attempts to install miners on servers owned by organizations. When these attempts are successful, the companies’ business processes suffer because data processing speeds fall substantially.
In Q2 2017, the average share of spam in global email traffic amounted to 56.97%, which was only 1.07 p.p. more than in the previous quarter. One of the most notable events of this quarter – the WannaCry epidemic – did not go unnoticed by spammers: numerous mass mailings contained offers of assistance in combating the ransomware.