Recent Articles

The State of AI in Cybersecurity Today

Artificial intelligence is a requirement to keep ahead of cyber threats today and even more so in the future.

The (Security) Dangers of Over Confidence

Organizations did not recognize that a scattered approach to web application security left them vulnerable to attack, and confidence remained high.

Happy Dyn Attack Anniversary!

There is a vast underground that thrives and grows on the digitization of our economy, and demonstrate no signs of slowing down any time soon.

Enhancing Application Security Processes

Organizations are performing a balancing act, pushing forward with digital transformation while seeking ways to optimize application security.

10 Commandments for Securing Microservices

Here are 10 characteristics to look for when considering protection to data and applications in a service mesh architecture.

More Destructive Botnets and Attack Vectors Are on Their Way

If the growth of the attack landscape continues at this rate, we as security practitioners need to begin asking serious questions.

Cloud Party 2019, a Celebration You Won’t Want to Miss

By 2021 only 50% of the current physical infrastructures will remain, while the other 50% will be divided equally between the private and public cloud.

Don’t Get Schooled in “Hackademia”

With IoT & 5G happening in real-time and in parallel, SPs are leading in the deployment race for effective cyber-defense systems for higher ed institutions.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.