[gtranslate]
Monolithic architecture organized on a project

What is microservice architecture and monolithic architecture?

What is microservice architecture and monolithic architecture? Microservice architecture and monolithic architecture are terms used to refer to two ways of thinking and building the architecture of applications and software.

Publicação
Spyware cracking smartphone and being detected by a magnifier

What is spyware?

What is spyware? As its name suggests, spyware is a spy software and one of the top internet threats to businesses and individuals. Spyware is a type of malware (or

Publicação
Bulk junk or graymail delivering an unwanted content

What is the difference between bulk email, junk email and graymail?

What is the difference between bulk email, junk email and graymail? The question is simple but can still cause a lot of confusion: what’s bulk email, junk email and graymail?

Publicação
Anti-spam blocking a lot of email threats and leting a girl and a man happy

What is anti-spam?

What is anti-spam? The term anti-spam is used to refer to a software or to processes of detection and analysis that aim to block spam (or unwanted messages). The problem

Publicação
Human head with gears from machine learning on the traffic

What is machine learning?

What is machine learning? Machine learning (ML) is a method of data and information analysis that allows machines to learn and evolve. ML is one of the mechanisms behind artificial

Publicação
Trojan horse in front of a castle

What is trojan?

What is trojan? A trojan, or trojan horse, is a malware widely used for hacking and stealing data. The more advanced forms of trojan act by opening channels of communication

Publicação
Junk dealer in fornt of a junk food at a junk email

Why we call junk email “spam”

Why we call junk email “spam” Junk email and any other unsolicited messages are called spam because of a British comedy group known as Monty Python and a canned ham

Publicação
Mind controlling cientists to insert gears at a robot's mind as we do with artificial intelligence

Why use artificial intelligence and machine learning for email protection

Why use artificial intelligence and machine learning for email protection For sure, artificial intelligence (AI) and machine learning (ML) are among the best solutions for preventing and fighting cyber threats

Publicação
False positive and false negative checkboxes

What are false positive and false negative in information security?

What are false positive and false negative in information security? In the world of information security, false positive is the term used to indicate a file or item that is

Publicação
Arrows hitting target right in a target around the world as DDoS attack does

What is a DDoS attack?

What is a DDoS attack? A Distributed Denial-of-Service attack (DDoS) is an attempt to disrupt and block a server, network or service for a limited or unlimited time by overloading

Publicação