September 22, 2020 | David Bisson

Why misconfigurations are such an issue in your containers and Kubernetes

This blog was written by an independent guest author. Organizations are increasingly incorporating containers and Kubernetes into their IT infrastructure. As reported by ZDNet, Flexera’s “2020 State of the Cloud Report” found that about two-thirds (65%) of organizations were using Docker and that another 14% intended to begin using it at some point. Slightly fewer organizations (58%) were using Kubernetes…

September 22, 2020 | Nick Cavalancia

Security awareness training explained

This blog was written by a third party author. Cyberattacks are an almost daily occurrence for many IT and security professionals, and there are a host of different security solutions in the marketplace today that look to help companies detect and prevent those attacks. However, despite all the technology organizations have in place, their users remain their weakest link. Phishing…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

September 21, 2020 | Karoline Gore

Cyber safety tips for virtual events

This blog was written by an independent guest blogger. Since the start of the Covid-19 pandemic, the use of video chat software like Zoom has increased to 300 million meetings held per day. Unfortunately, hackers have taken to crashing private meetings and flooding them with objectionable content — a phenomenon known as Zoombombing. If you’re planning a…

September 17, 2020 | Ericka Chickowski

What is DDoS mitigation and how does it work?

This blog was written by a third party author. Distributed denial of service (DDoS) attacks are a favorite method for attackers to disrupt or debilitate firewalls, online services, and websites by overwhelming systems with malicious traffic or transaction requests. DDoS attackers accomplish this by coordinating an army of compromised machines, or 'bots', into a network of devices they control from…

September 16, 2020 | Nick Cavalancia

Dark Web monitoring and scanning explained

This blog was written by a third party author. Shady deals often occur in darkness – criminal activities require secrecy to cloak their illicit nature. Today, you can find those dark places on the fringes of the internet, known as the Dark Web. More often than not, this is the place where cybercriminals go to monetize the data they&rsquo…

September 15, 2020 | Michelle Moore

Inside the Infographic: “Cybersecurity by the Numbers”

The ongoing cybercrime epidemic has triggered a cybersecurity calls to arms, as organizations around the world are looking for some 3.5 million skilled workers to help fight a $6 trillion problem. One of the cool features of the University of San Diego’s comprehensive new Cybersecurity Jobs Report is a shareable graphic that spotlights the cybercrime epidemic, the ongoing shortage of…

September 14, 2020 | Kate Brew

Preparing for Zero Trust and planning your strategy

I listened in on a neat webcast recently, which was jointly produced by AT&T Cybersecurity and Palo Alto Networks: “Preparing for Zero Trust and Planning your Strategy.” Panelists were John Kindervag, Field CTO, Palo Alto Networks, Steve Sekiguchi, Director, AT&T Chief Security Office, Bindu Sundaresan, Director, AT&T Cybersecurity and Tawnya Lancaster, Lead…

September 10, 2020 | Mark Stone

Firewalls explained: the different firewall types and technologies

This blog was written by a third party author. Finding the right network security tools to secure your sensitive data can be a significant challenge for any organization. Choosing a firewall may seem like a simple task, but companies can get overwhelmed by the different firewall types and options. Making the distinction between a firewall and other security solutions can…

September 9, 2020 | Nahla Davies

What you need to know about securing your APAC business and the recent data law changes

Data breaches are growing in frequency and intensity amidst the recent Coronavirus pandemic, having increased by nearly 273% in the first quarter compared to the same time frame last year. In fact, 2020 may very well be remembered as the year when cybersecurity became a business problem rather than a technology issue. The driving factor here is the recent shift in workforce…

September 9, 2020 | Mark Stone

What is Incident Response?

This blog was written by a third party author. As new types of security incidents are discovered, it is absolutely critical for an organization to respond quickly and effectively when an attack occurs. When both personal and business data are at risk of being compromised, the ability to detect and respond to advanced threats before they impact your business is…

September 8, 2020 | Kim Crawley

6 Crucial password security tips for everyone

This blog was written by an independent guest blogger. These days, everyone has passwords. Lots and lots of passwords! When I think of how many user accounts with passwords that I have, I probably have dozens. A few for social media platforms like Twitter and LinkedIn, a few for my favorite media streaming services, one for Nintendo Switch and another…

September 2, 2020 | Bernard Brode

How Covid-19 has increased vulnerabilities in Industrial Control Systems

This blog was written by an independent guest blogger. By now, most are aware that the Covid-19 pandemic has led to a spike in cyberattacks. This sharp increase in malicious activity related to COVID has taken the typical form of adversaries seeking to benefit financially, gain unauthorized access to networks for immediate and long-term strategic benefit, and spread misinformation with…