Remove 12
Remove 2013 Remove 2019 Remove Manufacturing Remove Security
article thumbnail

MY TAKE: Why DDoS weapons will proliferate with the expansion of IoT and the coming of 5G

The Last Watchdog

In March 2013, several impossibly massive waves of nuisance requests – peaking as high as 300 gigabytes per second— swamped Spamhaus , knocking the anti-spam organization off line for extended periods. His blog, Krebs on Security , was knocked down alright. Here we are in 2019 and the same attack strategy continues to persist.

IoT 263
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

ARMA defines data as “Any symbols or characters that represent raw facts or figures and form the basis of information” (ARMA 2016, p 12). That is almost 2000 times more data in less than 20 years (Press 2013, Patrizio 2018). IDC estimated the world created.16 16 ZB (zettabytes) of data in 2006, then 2.83

article thumbnail

The Microsoft Exchange Attack Saga Continues

eSecurity Planet

While Microsoft released a series of security updates on March 2, in order to address the discovered vulnerabilities, they felt the need to simplify the mitigation process for their customers in order to attain herd immunity across the world. It is important to note that the simplified tool is not a replacement for the security updates.