[{"itemUrl":"/security/incapsula-battles-massive-470gbps-ddos-attack-but-is-size-still-issue-3642735/","headline":"Incapsula battles massive 470Gbps DDoS attack - but is size still the issue?","metaKeywords":"DDoS attacks,Big DDoS attacks,DDoS spells trouble.,recent Imperva attack,DDoS haven&rsquo,reliable attack number,largest DDoS,smaller DDoS,BBC iPlayer site","id":3642735},{"itemUrl":"/security/carbon-blacks-detection-exchange-puts-humans-back-into-threat-sharing-3642608/","headline":"Carbon Black's Detection eXchange puts humans back into threat sharing","metaKeywords":"threat intelligence,Carbon Black&rsquo,Carbon Black,Johnson,collective threat intelligence,Cyber Threat Alliance,threat intelligence universe,good idea","id":3642608},{"itemUrl":"/security/brexit-gdpr-why-leaving-eu-will-make-life-harder-for-enterprises-3641825/","headline":"Brexit and the GDPR - why leaving the EU will make life harder for enterprises","metaKeywords":"data protection,EU,EU General Data,UK data protection,GDPR,EU data protection,EU model clauses,good idea,best UK enterprises,technical data breaches","id":3641825},{"itemUrl":"/security/how-balabit-adapted-machine-learning-secure-privileged-account-blind-spot-3642389/","headline":"How BalaBit adapted machine learning to secure privileged account 'blind spot'","metaKeywords":"Shell Control Box,SCB,BalaBit,security firm BalaBit,Blindspotter,individual network accounts.,network proxy appliance,relatively unknown firm,network users","id":3642389},{"itemUrl":"/security/ransomware-explained-how-digital-extortion-turns-data-into-silent-hostage-3642085/","headline":"Ransomware explained – how digital extortion turns data into a silent hostage","metaKeywords":"ransomware,new ransomware families,Locky ransomware,Recent ransomware attacks,aggressive Locky ransomware,advanced ransomware,h2,basic attack profile","id":3642085},{"itemUrl":"/security/story-of-ddos-extortion-attack-how-one-company-decided-take-stand-3642016/","headline":"The story of a DDoS extortion attack – how one company decided to take a stand","metaKeywords":"DDoS,DDoS extortion attack,Ralf Gladis,massive DDoS attack,smaller demo DDoS,DDoS extortion threats,DDoS attacks,DDoS attackers,DDoS attack,extortion","id":3642016},{"itemUrl":"/security/william-hague-infosec-community-there-can-be-no-absolute-right-privacy-3641639/","headline":"William Hague to InfoSec community: 'there can be no absolute right to privacy'","metaKeywords":"absolute right,secretary William Hague,William Hague,foreign secretary,largest information security,information security community,public opinion","id":3641639},{"itemUrl":"/security/this-is-how-police-want-your-internet-connection-records-look-3641581/","headline":"This is how the National Crime Agency thinks your internet connection records will look if the Snooper’s Charter passes into law","metaKeywords":"internet connection records,NCA,p2,investigatory powers,h2 class=,secretary andy burnham,home secretary,shadow home secretary,home secretary andy","id":3641581},{"itemUrl":"/security/are-firewalls-still-important-making-sense-of-networkings-greatest-security-layer-3641295/","headline":"Are firewalls still important? Making sense of networking's greatest security layer","metaKeywords":"firewall management,firewalls,DDoS attacks,Unified Threat Management,security,firewall management firm,firewall management systems","id":3641295}]