Earlier this year I took on the role of Product Evangelist — WordPress for SiteLock and became an ambassador of sorts to the WordPress community. Being a product evangelist means taking on a wide scope of activities, most visibly attending and speaking at WordCamps. Prior to stepping into this role, I had attended other conferences, but mostly related specifically to the hosting and cyber security industries. Starting out with a bang, my first event was WordCamp Miami.
Author: Lauren Papagalos Page 4 of 17
WordPress is one of the largest website platforms available and currently powers over 26 percent of the internet. It is also the largest open-source software in the market, with over 60 million websites currently running the software. WordPress has used open-source to set itself apart and provide a long lasting impact on the online community. Continue reading as we dive in deeper and explore why open-source makes WordPress so successful.
George Greene is the website developer for FuturePastFifty.com, a WordPress website devoted to providing resources, ideas and community for people over the age of 50. The site is the creation of Nancy Burke and Marg Penn Ph.D. Together they bring years of life coaching and consulting experience, as well as a passion for transitioning people through changes in life to the website.
Did you know that SiteLock scans more web pages in a day than McDonald’s sells hamburgers? How about that we analyze more source code files per day than Dominos sells pizzas in a year? We’ve put together this infographic to give you an idea of how quickly we work to mitigate cyber threats.
If you’ve ever seen me at a WordCamp, you’ve probably heard me answer this question, and likely more than once. When it comes to malware scanning on a WordPress website, what makes the SiteLock® malware scanners different from the competition? Well, scanners simply are not created equal. My go-to short answer is typically explaining one of our scanners’ “killer features,” like its ability to automatically remove malware.
Last weekend brought me to WordCamp Fayetteville 2016 in beautiful, green Arkansas. Fayetteville has been holding WordCamps for the Northwest Arkansas WordPress community since 2010, making it one of the more mature North American WordCamps. This year’s #WCFAY was hosted at the Donald W. Reynolds Center for Enterprise Development on the University of Arkansas campus which provided three tracks, including one large auditorium.
WordCamp New York City departed from the norm this year by hosting not at an academic facility, but at the prestigious United Nations Headquarters in Manhattan. Seated on the East River, the United Nations Headquarters boasted impressive art pieces and beefy airport-like security. WordCamp NYC took part in the UN’s Unite Open Source initiative which aims to “break down barriers to technology innovation through open source governance, communities and collaboration.” #WCNYC hosted their two tracks in two huge auditoriums, equipped with state-of-the-art audio/video equipment, including individual microphones for each seat.
Security researchers at security firms like SiteLock® audit code that has been flagged as suspicious, either by individuals or by an automated system performing behavioral analysis (which we’ll talk more about in the next section), to determine whether or not the code is actually malicious. If a file or piece of code is deemed malicious by the security researcher, it enters the database, typically as either a file match signature, or a code snippet signature.
Starship WordCamp Orange County began its 48-hour voyage to boldly go where no WordCamp has gone before on July 9. The space-themed #WCOC was hosted in the Applied Innovation compound of the University of California’s Irvine campus. The event took place upstairs in an area called “The Cove,” which also contains what appeared to be various upstart companies’ offices as well as an impressive array of big-screen displays in most conference rooms. There were four tracks to host the talks, which were also themed in title, The Nebula, The Comet, The Dwarf Star and The Asteroid Field.
You could consider signature-based analysis to be like a policeman running the plates of every car in a parking lot against the police department’s database of stolen vehicles. While this may be an effective method for finding stolen vehicles, if the license plate on the car has been changed or obscured, the car will most likely be overlooked. Keeping with this analogy, behavioral analysis would be the detective.