Specs
February 26, 2020
Followers (0)
Related Articles (764)
RSA Conference Endures Cybersecurity Incident, Again
As a global leader in cybersecurity, the irony of RSA's history of cyber incidents at conferences is lost on no one. Last week, at its annual RSAC, the company endured another security breach. Conference app user names were improperly accessed, calling all the cybersecurity industry into question.
Tune Chrome Extension Limits Toxic Web Comments
A recent survey shows 27% of Americans choose not to publish something online for fear of harassment. Some of tech's most innovative companies are scrambling to combat toxic and abusive online speech. A new Jigsaw/Google Chrome extension, Tune, allows users to limit their viewed toxic comments.
How APIs Can Block Suspicious Web Visitors Based on IP Address
We don't want to allow signups from VPNs or proxies. Visitors using a VPN or TOR, which hides their real location and identity, might be trying to perform malicious activity on your site. So how can we block these users? This article shows how the ipdata threat API can help you do this.