Blue Security Builds ‘Do Not Intrude Registry’

Blue Frog

Patterned after the Federal Do Not CallRegistry, Blue Security (www.bluesecurity.com) has created a free Do NotIntrude Registry, which forms a communityof people to fight spam by registeringvia the Web and downloading its “BlueFrog” to their computers. Once an individualbecomes a community member, thecompany analyzes spam collected by itsspam sensors and sends warnings to Websites responsible for spamming. If thewarning is ignored, the Blue Frogs installedon community members’ computers automaticallypost complaints for every spammessage received on the Web sites that areadvertised by the spammers—eventuallydisrupting their ability to do business ifthey continue to spam members.

Featured

  • cloud with binary code and technology imagery

    Hybrid and AI Expansion Outpacing Cloud Security

    A survey from the Cloud Security Alliance and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.

  • interconnected gears and cogs

    Integration Brings Anthropic Claude AI Models to Copilot

    Microsoft has integrated Anthropic's Claude artificial intelligence models to its Microsoft 365 Copilot platform, giving enterprise users another option beyond OpenAI's models for powering workplace AI experiences.

  • open laptop with various educational materials like charts, quizzes, and documents emerging from the screen

    Pear Deck Learning Debuts New AI Features

    GoGuardian recently introduced new artificial intelligence features within its Pear Deck Learning curriculum and instruction platform, designed to aid educators throughout their teaching journey — from lesson planning to assessment.

  • woman using network-connected printer

    The Hidden Cyber Risk in Schools

    Printers may not be glamorous, but they are an often-overlooked attack vector that should be part of every district's cybersecurity strategy.