Showing posts with label changes. Show all posts
Showing posts with label changes. Show all posts

Tuesday, July 12, 2011

Google Display Network Getting Changes to Campaign Settings

Google is making change to the way Google Display Network campaign settings work, announced the Inside AdWords blog. This change will affect campaigns that meet these criteria:

Google Display Network Getting Changes to Campaign Settings


Backlink: http://feedproxy.google.com/~r/DTWB/~3/mTa3A4V3ZEw/

Friday, December 3, 2010

Wikileaks Lost Domain Name, Amazon Services Following DDOS Attack, Changes Its Web Address

The DNS Company EveryDNS.net have terminated its services to the controversial Wikileaks domain name. Citing the reason as the large scale DDOS attacks. But Wikileaks has already reappeared using a Swiss web address.

Wikileaks Lost Domain Name, Amazon Services Following DDOS Attack, Changes Its Web Address


Backlink: http://feedproxy.google.com/~r/DTWB/~3/GJ1WgsUFjfg/

Friday, November 19, 2010

New Threats Demand Organisational Changes, says IT Security Expert

The information security threat landscape has changed in 2010, taking on a highly targeted form and creating new issues for organisations. To meet this challenge head on, IT Security expert Richard Stiennon from IT Harvest USA has recommended a new organisational structure be adopted.

Speaking ahead of his presentation at CeBIT Australia’s IT Security Conference, Mr Stiennon explained it was not until 2010 that many organisations identified the changing form of threats.

“It’s only in the last 12 months that organisations have begun to realise a fundamental shift in the threatscape”

And as the types of threat evolve, the structure of a security team needs to evolve too, says Stiennon.

“New threats and new environments do require organisational changes. I think that’s what has to happen pretty quickly”

“Only through this organisational change is a company or government organisation going to get on top of this new level of threat”

Stiennon has recently released a suggested structure for a new "cyber defence team".

“I’ve recently gone public with a description of what a cyber defence team would look like. There’s three elements; there would be a research team who is responsible for understanding that threat environment, to understand what’s going on so they can translate those in to what it means for their internal organisation”

“You then need an operational team who goes after already successful attacks”

“The internal operational team would work with the existing infrastructure you’ve got now for handling viruses and patch management but would look deeper in to countering unique instances that have occurred”

“Then finally, a third element is essentially a “red team” - people who are acting as insiders and attempting to find vulnerabilities and methods of attack before the bad guys can”

This proposed team would then report to a new position who would then sit under the CIO, says Stiennon.

“Then working all together and reporting up to a new role - call it a Cyber Defence Commander or something else if you don’t care for the military terminology”

“That person would be responsible probably to the CIO, for making them completely aware of not only the threatscape but the level of exposure that the organisation has”

Stiennon described the Stuxnet attacks as being a recent example of these new types of threat.

“We saw just in the last several months the development of Stuxnet, which is the very, very sophisticated attacks against some control networks inside a manufacturing facility - and possibly a nuclear refinement facility”

This new form meant that the attacker and the target took on a much more personal role, he explains.

“Now, it’s some adversary who has selected a target, which is your data and they are going to be prepared to do whatever they can to get at that data”

Stuxnet and similar attacks meant that traditional forms of protection were now no longer adequate, he said.

“It’s completely different than using classic signature based anti-virus or ITS to just protect your networks from the constant background radiation of attacks that’s always been with us”

Richard Stiennon is presenting at CeBIT Australia’s IT Security Conference, taking place on 29 November in Sydney.

This conference brings together industry leaders to exchange ideas and advice about how they are minimising security threats to their organisations while taking full advantage of today’s open and connected environment.

Find out about the program and full speaker line-up at www.cebit.com.au/it-security.

Monday, November 15, 2010

The More The Web Changes, The More It Stays The Same (With A Map)

There’s a saying in French which goes “plus ça change, plus c’est la même chose” which translates as the more things change, the more they stay the same. Maybe the same could be said to apply to today’s World Wide Web … “plus les changements web, plus le web reste le même”, the more the Web changes, the more the Web stays the same, with blame firmly put at Google Translate if this doesn’t translate properly.

Thursday, October 28, 2010

Comment on Why Broadband Changes Everything by Om Malik

Howie I think it is a "work in progress" reality when it comes to WiFi or for that matter any Internet-related technology. Look at where we are today and where we were at the turn of the century -- it is night and day. But as you say, more needs to be done. PS: I hate the WiFi-related issues as well and despite sitting next to the router, I am currently getting about 12 Mbps to the laptop. I plug-in Ethernet cable, well that is running at about 50 Mbps. So I feel your pain :-)

Post originale: http://gigaom.com/2010/10/26/why-broadband-changes-everything/#comment-441679

Wednesday, October 27, 2010

Why Broadband Changes Everything

Consumers are using the Internet more often for more things, such as voice communication and streaming video, according to the Cisco Systems Visual Networking Index Study. Peak hours, when Internet traffic is up to 72 percent higher than average, could soon become the new prime time.

Post originale: http://feedproxy.google.com/~r/OmMalik/~3/Gpmt353dy3A/