October 26, 2020 | Nick Cavalancia

Mobile device security explained

This blog was written by a third party author. With recent global health events resulting in a surprise shift to an either completely remote or hybrid remote workforce for many organizations, the need to leverage mobile devices as work endpoints has grown significantly. This has created challenges for IT in maintaining both the ability to manage a wide range of…

October 22, 2020 | Lisa Ashjian

SPAM text messages vs SMiShing and defending against it

The rise of SPAM text messages Businesses want to connect to their customers and meet them where they are. One growing way to communicate to them is through text messages including providing coupons, recent news, and other marketing materials. When these marketing efforts are unwanted by the customer, this is when they cross the line into the SPAM category. SPAM…

Get the latest
security news
in your inbox.

Subscribe via email


October 21, 2020 | Mark Stone

Cloud firewall explained: what is firewall as a service?

This blog was written by a third party author As organizations continue moving away from hosting services and applications with onsite servers, the use of virtual machines and cloud-based security solutions like Firewall-as-a-service (FWaaS) is trending upward. With this shift away from traditional network security solutions, cloud firewall deployments have become the norm for many businesses.  Here are answers…

October 21, 2020 | Karoline Gore

Internet of Things toys are fun but raise privacy and socio-political concerns

This blog was written by an independent guest blogger. An estimated 38 billion devices are connected to the internet this year, highlighting the fact that the Internet of Things (IoT) is not a farfetched futuristic concept, but the reality for most of the modern world. Many of these connected devices are toys that children enjoy, but no matter how fun they…

October 19, 2020 | David Bisson

PSPs vs. OPA Gatekeeper: Breaking down your Kubernetes Pod security options

This blog was written by an independent guest blogger. Organizations are increasingly turning to Kubernetes, but they’re having trouble balancing security in the process. In its State of Container and Kubernetes Security Fall 2020 survey, for instance, StackRox found that 91% of respondents were using Kubernetes to orchestrate their containers and that three quarters of organizations were using the open-source…

October 15, 2020 | Mark Stone

CMMC compliance explained: what is the Cybersecurity Maturity Model Certification?

This blog was written by a third party author With an escalating cybersecurity threat risk that doesn’t appear to be slowing down, the Department of Defense (DoD) has taken proactive measures in creating the Cybersecurity Maturity Model Certification (CMMC). The CMMC will soon be a requirement for any defense contractors or other vendors that are, or wish to…

October 15, 2020 | Kim Crawley

What is threat modeling?

This blog was written by an independent guest blogger. A lot of cybersecurity terminology can sound complex and esoteric. You may hear defensive security specialists, the people who work to secure computers and their networks, talk about threat models and threat modeling a lot. So what is threat modeling? It’s actually pretty simple, and it’s a…

October 14, 2020 | Mike Klepper

Penetration Testing Services: what to look for in a pen test provider

These days computers and the software that operate upon them touch practically every part of our professional and personal lives.  The information they store, process and transmit is the foundation upon which businesses are built, how customer experiences are delivered, and how we find the best takeout food in our immediate area.  So why is it so hard…

October 13, 2020 | Nahla Davies

What is search engine clickbait and how do hackers trick Google’s crawlers?

This blog was written by an independent guest blogger. Search engine optimization (SEO) works with algorithms to ensure that the most relevant and most popular webpages show up first in an internet search. SEO makes sure that the best websites get the biggest boost. However, SEO has a lesser-known, evil twin called black hat SEO. This term refers to a…

October 7, 2020 | Karoline Gore

Get smart and stay safe: Best practices to protect you from digital financial fraud

This blog was written by an independent guest blogger. The past two years have seen a 391% rise in fraudulent attempts that target digital transactions around the world. The research carried out by TransUnion also saw a specific increase of 347% in relation to account takeover so the average consumer needs to up their understanding of financial fraud risks. When data breaches…

October 5, 2020 | Vanessa Venugopal

Insider threats: What are they and how to prevent them

This blog was written by an independent guest blogger. Companies need to establish a secure system to avoid insider threats and other online issues that could destroy a business. There are different online threats that businesses face every day. The most common of which is phishing attacks were the victim accidentally clicks on an unsafe link and log in. Other…

October 2, 2020 | Ericka Chickowski

Deep packet inspection explained

What is deep packet inspection? Deep packet inspection (DPI) refers to the method of examining the full content of data packets as they traverse a monitored network checkpoint. Whereas conventional forms of stateful packet inspection only evaluate packet header information, such as source IP address, destination IP address, and port number, deep packet inspection looks at fuller range of data…