Recent Articles

How to Respond to a DDoS Ransom Note

The damage from a DDoS ransom note can frequently be contained if dealt with in advance. Here are a few tips for handling a DDoS ransom note.

Keep It Simple: Choosing the Right DDoS Mitigation Strategy

The cyber industry offers a plenitude of DDoS mitigation solutions. Here are a few guidelines that can help simplify your selection process.

Top Cybersecurity Challenges Facing Government Agencies

The public sector is targeted by an array of threat actors, like hackers, hacktivists & state-sponsored threats. Here's how agencies can protect themselves.

What is the Future of Cybersecurity Jobs Post-COVID19?

The current situation presents interesting opportunities for job seekers and employers looking to reinvent their organizations.

How Should APAC Organizations Protect Critical Data & Assets?

The on-going effects of the pandemic are impacting businesses' cybersecurity. Here are the latest cyberthreats CIOs need to be aware of in the APAC region.

Cybersecurity: Pay Now or Pay (More) Later

Organizations must reevaluate how they balance the investment versus risk equation and alter how and when they implement cybersecurity.

Digital Attacks on Educational Resources

With closures in response to COVID & the looming threat of additional waves, schools have digitally transformed in ways we never could've imagined.

Six Steps for Securing Smart Cities

Smart city technologies can help improve urban areas if they can stay secure & retain the trust of citizens. Here are 6 ways they can do that.

4 Questions to Ask About Open Banking Compliance

Bot attacks on websites & applications are a well-known threat. But crucial APIs, including those used for Open Banking, are increasingly being targeted.

Most Popular

Layer 7 Attack Mitigation

The DDoS world hits new records lately, with the attacks on KrebsOnSecurity.com and later on OVH and Dyn reached a bandwidth of more than 1T of traffic. While the bandwidth numbers are impressive indeed, the numbers themselves were expected. The DDoS security experts expect...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centers. In this new environment, workload security is defined by which users have access to your cloud...

GDPR and HITECH: Can the past predict the future?

In February of 2017, Memorial Healthcare System settled their HIPAA violation fines for $5.5 Million USD. During an investigation, it was discovered that over 100,000 patient records had been impermissibly accessed. Allegedly, an ex-employee retained access to personal identifying information and sold data records...

Recommended

The State of Web Application Security 2019

This report details current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.