Mobile security platform leverages zvelo’s full-path URL classification to identify malicious and suspicious URLs appearing within whitelisted sites.Details
zveloDB is the industry’s most advanced and comprehensive URL Categorization Database which categorizes content into topic-based, objectionable, and malicious category groupings for applications including DNS filtering, web content filtering, brand safety & contextual targeting, and subscriber analytics.
While both can be harmful, dangerous, or threaten the safety of online users, there are very clear distinctions between Malicious vs Objectionable content. Understand how zvelo differentiates between them.
OEMs receive notification that the RuleSpace URL database is going end of life (EoL) leaving security partners scrambling to find a RuleSpace alternative.Details
Alex Wood from the Colorado = Security Podcast sat down with zvelo President & CEO, Jeff Finn, to discuss zvelo’s background and position in the Information Security space.Details
Over many years or testing, trial and error, zvelo ultimately determined that a human-machine “hybrid” approach to classification produced the best outcomes. The Human element provided the verifications necessary for the highest levels of accuracy, while machines (ie. AI/ML models and calculations) provided the scaling necessary to deal with the incredible volumes of new URLs and content being published at an increasing rate.
As discussed in a previous blog, DNS RPZ provides IT teams and network administrators with a “DNS configuration layer”, or rewrite module, to effectively handle DNS responses with the open source domain name system software, BIND.
First off, let’s make it clear that there is nothing inherently malicious about the act of cryptocurrency mining. Rather, over the past couple of years cybercriminals and bad actors have leveraged existing exploits and found unsecured hardware to implant Cryptocurrency Mining code and steal CPU/GPU cycles from computer owners and website visitors without their knowledge. These activities are what we refer to as “Malicious Cryptocurrency Mining”.
Since the release of BIND 9 in 2010, RPZ has proven a powerful technology for security and network management—allowing organizations to implement an additional DNS configuration layer. In fact, BIND is the most widely used Domain Name System software on the internet—making RPZ configuration options like integrating commercial feeds, blocklists, and URL databases like zveloDB™ all the more attractive. So let’s take a moment to revisit the advantages of RPZ.
eSoft, Inc., a leading vendor of integrated Internet security and content management solutions, announced today that it is offering its award-winning network security technologies and databases to Original Equipment Manufacturers (OEMs) for product integration.Details