-
Cloud IaaS: 16 recommendations for secure servers
Here are Jean François Audenard's 16 recommendations for securing a cloud-hosted IaaS virtual machine...
-
main takeaways from CSA EMEA 2013
What are the key takeaways from the Cloud Security Alliance (CSA) EMEA Congress 2013 in Edinburgh on September 25 and 26?
-
businesses sending spam: fact or fiction?
While everyone knows about “incoming” spam, spam sent by company networks suffers from a serious lack of communication. Sometimes it’s even a taboo…
-
how does spam work?
Everyone has come across unsolicited messages in their inbox. OK, so everyone knows about spam, but what is it exactly?
-
the great password masquerade
People who work in IT security (including me) often defend old habits that should really no longer be in use. Passwords are one of the places where a…
-
don't touch my BYOD!
The BYOD phenomenon is the result of a groundswell movement. Companies are now torn between the advantages of this model and the security challenges…
-
cloud computing: weapon of choice for DDoS?
Is the Cloud a weapon of choice for launching dedicated denial of service (DDoS) attacks? Will the Cloud make botnets and hacktivist groups just two…
-
Second Life: players unknowingly recruited for a DDoS attack?
A group of Second Life players were taken for a ride as part of a digital revenge plot.
-
real-time info from the IMDDOS helpdesk
As you've likely already heard, a commercial service for launching distributed denial of service (DDoS) attacks, called IMDDOS, was discovered by…
-
the battle against DDoS attacks: our experience (part 2)
In the part one of this article, a Cleaning Center had been deployed against the attacks at the Orange subsidiary's network connection points.
Sort by :
32 results for
Jean-François Audenard :
Blog post (32)