Speaking of Malware | The Strongarm Blog

Building Trust on the Internet: How HTTPS Works

November 10, 2017 | By Austin Rose

How often do you notice this friendly green lock in your web browser? Hopefully you are seeing it on just about every website you visit. In fact, there should be something similar in your URL bar right now. This lock is very important. It indicates...

MORE

Multi-Factor Authentication: Everything You Need to Know

October 5, 2017 | By Oliver Scarborough

It is no secret that login credentials are among the most frequently targeted pieces of user data by malicious entities. This past summer, one of the largest spambot dumps—including over 711 million records, including nearly 50 million passwords, was reported by Troy Hunt. Having your...

MORE

Domain Feeds Update: July 2017

July 10, 2017 | By Patrick Cloke

We’re always researching new sources of malicious domains to block via Strongarm. In addition to harnessing the collective intelligence provided by Strongarm customers using our community feed, we’ve also recently added three new domain feeds (sources of malicious domains) to Strongarm. These sources provide us...

MORE

How to Configure Multiple Databases in Django the Simple Way

March 7, 2017 | By Ryan Scott

I was recently tasked with a project that required adding a second database to the Strongarm dashboard, which is a web application powered by Django. There are a number of reasons why having multiple databases in Django might be necessary an application. In our case, we’re...

MORE

How to Secure an Open DNS Resolver

December 22, 2016 | By Mark Zealey

One of the challenges of running an open DNS resolver is that it can be used in a number of different attacks, compared to a server that is only allowed access from a known set of IPs. One of the most well known is the...

MORE

Automate Repetitive Software Maintenance Tasks with Strongjobs

November 10, 2016 | By Stephen DiCato

Building high-quality software-as-a-service products requires continually verifying that all systems are up-to-date, secure, and functioning as expected. Doing this on a regular basis is the only way to guarantee security, reliability, and availability to your users. To accomplish this, software teams often have to execute...

MORE