What is URL filtering? Web filtering explained

January 7, 2021 | Ericka Chickowski
Ericka Chickowski

Ericka Chickowski

An award-winning freelance writer, Ericka Chickowski specializes in telling stories about the intersection of information technology and business innovation. Her perspectives on cybersecurity have appeared in numerous trade and consumer magazines, including Dark Reading, Entrepreneur, InformationWeek, and Security Boulevard.

January 7, 2021 | Ericka Chickowski

What is URL filtering? Web filtering explained

This blog was written by a third party author. What is URL filtering? URL filtering is one of the most common types of web filtering techniques used by organizations to restrict the kinds of content that their users may access.  URL filtering blocks users from loading questionable websites or hosted files via corporate device or network resources. The filter…

January 5, 2021 | Ericka Chickowski

What is a software-defined perimeter and how does SDP work?

This blog was written by a third party author. What is a software-defined perimeter? A software defined perimeter (SDP) establishes virtual boundaries around Internet-connected assets and user activity through an integrated security architecture approach. SDP works regardless of whether assets reside on-premises or in the cloud, or whether users are on-site or working remote. Rather than relying on hardware like…

December 18, 2020 | Ericka Chickowski

What is next gen antivirus? NGAV explained

This blog was written by a third party author. What is next gen antivirus (NGAV) and how does it work? In contrast to legacy antivirus technology, next generation antivirus (NGAV) advances threat detection on the endpoint by finding all symptoms of malicious behavior across an endpoint system rather than fixating on looking for known malware file attributes. NGAV uses artificial…

November 5, 2020 | Ericka Chickowski

What is a Cloud Access Security Broker? CASB explained

This blog was written by a third party author. What is a Cloud Access Security Broker (CASB)? A common component of modern cybersecurity infrastructure, a cloud access security broker (CASB) is technology that provides monitoring and mitigates risks from employee use of cloud services. CASBs were initially developed to fill a gap in cloud security visibility left behind by traditional…

October 30, 2020 | Ericka Chickowski

What is Smishing? SMS phishing explained

This blog was written by a third party author. What is SMS phishing? SMS phishing, or “Smishing,” is a mobile phishing attack that targets victims via the SMS messaging channel rather than through email. A natural evolution of the phishing phenomenon, smishing attacks attempt to dupe mobile users with phony text messages containing links to legitimate looking, but…

October 2, 2020 | Ericka Chickowski

Deep packet inspection explained

What is deep packet inspection? Deep packet inspection (DPI) refers to the method of examining the full content of data packets as they traverse a monitored network checkpoint. Whereas conventional forms of stateful packet inspection only evaluate packet header information, such as source IP address, destination IP address, and port number, deep packet inspection looks at fuller range of data…

September 24, 2020 | Ericka Chickowski

BYOD security explained: what is a BYOD policy?

This blog was written by a third party author What is bring your own device (BYOD)? Bring your own device (BYOD) describes the practice of using a personal device such as a smartphone or tablet to conduct business on an organization's network or with its data. Organizations constantly walk a tightrope with their BYOD policies to balance employee productivity…

September 17, 2020 | Ericka Chickowski

What is DDoS mitigation and how does it work?

This blog was written by a third party author. Distributed denial of service (DDoS) attacks are a favorite method for attackers to disrupt or debilitate firewalls, online services, and websites by overwhelming systems with malicious traffic or transaction requests. DDoS attackers accomplish this by coordinating an army of compromised machines, or 'bots', into a network of devices they control from…

August 25, 2020 | Ericka Chickowski

Security risk assessments explained

This blog was written by a third party author. What is a security risk assessment? A security risk assessment is a formal method for evaluating an organization's cybersecurity risk posture. Comprehensive security risk assessments take stock in business objectives, existing security controls, and the risk environment in which the business operates. When done well, the assessment identifies security gaps…

August 10, 2020 | Ericka Chickowski

Cybersecurity risk management explained

This blog was written by a third party author What is cybersecurity risk management? Cybersecurity risk management is the practice of prioritizing cybersecurity defensive measures based on the potential adverse impact of the threats they're designed to address. Establishing a risk management approach to cybersecurity investment acknowledges that no organization can completely eliminate every system vulnerability or block every…

July 14, 2020 | Ericka Chickowski

DDoS attack prevention and protection explained

This blog was written by a third party author. Why DDoS prevention is paramount Distributed denial of Service (DDoS) attacks stand as some of the most disruptive and costly cyberattacks that organizations face on a regular basis. Cyber criminals use DDoS attacks to make websites and other online services unavailable for legitimate use. They do this by coordinating a flood…

July 8, 2020 | Ericka Chickowski

Types of DDoS attacks explained

This blog was written by a third party author and does not reflect the opinions of AT&T The general types of DDoS attacks Distributed denial of service (DDoS) is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS…