Secret To the Market's Most Accurate and Comprehensive Web Categorization Service

Secret to the Market’s Most Accurate and Comprehensive Web Categorization Service

Estimated Reading Time: 3 minutes Over many years or testing, trial and error, zvelo ultimately determined that a human-machine “hybrid” approach to classification produced the best outcomes. The Human element provided the verifications necessary for the highest levels of accuracy, while machines (ie. AI/ML models and calculations) provided the scaling necessary to deal with the incredible volumes of new URLs and content being published at an increasing rate.

Using DNS RPZ to Protect Against Malicious Threats

Using DNS RPZ to Protect Against Malicious Threats

Estimated Reading Time: 7 minutes As discussed in a previous blog, DNS RPZ provides IT teams and network administrators with a “DNS configuration layer”, or rewrite module, to effectively handle DNS responses with the open source domain name system software, BIND.

Advantages of DNS RPZ | How It Works

Advantages of RPZ: Basics & Common Configurations

Estimated Reading Time: 5 minutes Since the release of BIND 9 in 2010, RPZ has proven a powerful technology for security and network management—allowing organizations to implement an additional DNS configuration layer. In fact, BIND is the most widely used Domain Name System software on the internet—making RPZ configuration options like integrating commercial feeds, blocklists, and URL databases like zveloDB™ all the more attractive. So let’s take a moment to revisit the advantages of RPZ.

Base Domain vs. Full Path URL. What's the Difference?

Base Domain URL vs. Full Path URL. What’s the Difference?

Estimated Reading Time: 5 minutes For the average web surfer, the URL bar provides a magical portal to the interwebz where anything that can be thought of can be entered—revealing the treasures of the internet at the stroke of ‘enter’. For the rest of us, we know it gets much more complicated than that as we slip down the rabbit hole and into OSI, DNS, TLS, HTTPS, subdomains…

Crowdsourced Security for Web Threat Intelligence

Estimated Reading Time: 3 minutes

If we have a thousand monkeys typing away on a thousand typewriters, surely they can produce great works of literature – or so goes the popular adaptation of the Infinite Monkey Theorem. But in the context of information security, a similar idea has been taking shape in past few years. Crowdsourced security, leveraging on input from a host of geographically dispersed systems, is slowly gaining ground as a means to provide actionable threat intelligence for both the public and private sectors.

Thoughts on Secure Programming, Education and BYOD

Estimated Reading Time: 3 minutes Recent events serve as the best example of how the context of security has shifted from the once server-centric model to that of a decentralized threat landscape. From the Heartbleed attacks to the widespread Internet Explorer vulnerabilities and finally the sensationalized OAuth issues, it appears that even organizations with a hardened perimeter infrastructure are just as vulnerable as an end-user at home.