There were 4 blog postings during February (2011):
Charting the vendor landscape for web and email security
Today's threat landscape is complex. Hackers no longer lust for fame, rather looking for ways to make their fortune. Simple exploits, such as a malicious email sent en masse, are no longer effective. This means that they have turned their hands to...
Fran Howarth, Bloor Research | 4th February '11
Critical infrastructure under attack
Critical infrastructure is a term that is used to describe assets and facilities that are essential for the functioning of society and the economy. It encompasses a wide range of vital assets, including utilities and communications networks, food...
Fran Howarth, Bloor Research | 14th February '11
Web security in an always-on world
My habits are not dissimilar to those of many others. In the morning, my first act is to collect my phone from beside the bed, check my email accounts and then look to see who has posted what on Facebook and Twitter. All these services are based in...
Fran Howarth, Bloor Research | 17th February '11
DDoS attacks: coming to a network near you
There has already been much fallout from the recent massive release of information by the WikiLeaks organisation—including attacks on WikiLeaks itself by those angered by its actions and aiming to disrupt and discredit the organisation. This saw...
Fran Howarth, Bloor Research | 24th February '11
Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761