Tag: complexity
-
The Cloudflare Blog: Bigger and badder: how DDoS attack sizes have evolved over the last decade
Source URL: https://blog.cloudflare.com/bigger-and-badder-how-ddos-attack-sizes-have-evolved-over-the-last-decade Source: The Cloudflare Blog Title: Bigger and badder: how DDoS attack sizes have evolved over the last decade Feedly Summary: If we plot the metrics associated with large DDoS attacks observed in the last 10 years, does it show a straight, steady increase in an exponential curve that keeps becoming steeper, or…
-
The Register: Data is the new uranium – incredibly powerful and amazingly dangerous
Source URL: https://www.theregister.com/2024/11/20/data_is_the_new_uranium/ Source: The Register Title: Data is the new uranium – incredibly powerful and amazingly dangerous Feedly Summary: CISOs are quietly wishing they had less data, because the cost of management sometimes exceeds its value I recently got to play a ‘fly on the wall’ at a roundtable of chief information security officers.…
-
CSA: How Can You Strengthen Google Workspace Security?
Source URL: https://www.valencesecurity.com/resources/blogs/why-application-specific-passwords-are-a-security-risk-in-google-workspace Source: CSA Title: How Can You Strengthen Google Workspace Security? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the security risks related to Application-Specific Passwords (ASPs) in Google Workspace, emphasizing their vulnerabilities and the need for stronger authentication methods. It provides practical security tips to mitigate the risks associated…
-
Simon Willison’s Weblog: Quoting Jack Clark
Source URL: https://simonwillison.net/2024/Nov/18/jack-clark/ Source: Simon Willison’s Weblog Title: Quoting Jack Clark Feedly Summary: The main innovation here is just using more data. Specifically, Qwen2.5 Coder is a continuation of an earlier Qwen 2.5 model. The original Qwen 2.5 model was trained on 18 trillion tokens spread across a variety of languages and tasks (e.g, writing,…