Most recent

Don’t Leave Your Web Applications Vulnerable to Attackers

Over 70% of cloud-based cyberattacks are focused on web applications, according to new research. This figure rightly has business owners worried. A web application is the public fact that a business presents to the internet. Attackers who successfully take advantage of web application vulnerabilities have the ability to deface the website, use drive-by-downloads to implant malware on visiting browsers, or outright steal personally identifying information from customers. What’s more, these vulnerabilities are frequent.

 

Read More
11 Dec 2017

It's Time To Leave Your PGP Security Behind

In the world of private encryption, there are few words more apocalyptic than “I gave away my private key.” It is rule number one of PGP security – never reveal your private key to anyone else. Unfortunately, in a maddening and completely avoidable blunder, the Adobe security team posted their private PGP key publicly on their blog.

Read More
30 Nov 2017

The Truth About The Deloitte Security Breach 

We’ve recently discussed the Equifax breach , and how terrible it was, but the credit giant is not the only company that’s been impressing us with a bad breach response. Deloitte, a firm which is ironically one of the world’s largest cyber security consultants, has been breached as well.
Read More
22 Nov 2017

How to Prevent Malware Hackers from Accessing Your Software

If you’re like most computer users, you probably wish that your machine could run faster. If you’re also like most computer users, you probably lack the technical skills and knowledge to accomplish this on your own. Therefore, you might be tempted by one of a number of programs that purport to make your computer run faster with no special skills required.


Read More
16 Nov 2017

Is Your Amazon S3 Server Secure? A 1-in-10 Chance Says It’s Not

Bad news for cloud proponents! The security firm Skyhigh Networks reports that 7% of Amazon S3 buckets are set to unrestricted public access, meaning that anyone with a link to the server can read it. Not only are almost one-in-ten databases completely insecure, more than a third are completely unencrypted. It’s open season on S3 implementations.

 

Read More
07 Nov 2017

Keep your Company's Data in the Right Hands with our Software-Defined Access Solution

Your organization faces a multitude of new business challenges in securing and monitoring sensitive data, providing authorized accessibility to applications, and safely sharing information in a hybrid cloud environment. Furthermore, you are expected to abide by heavy regulations and compliance standards in your industry.
Read More
01 Nov 2017

MSP: Is Your New Digital Service Compliant?

Offering managed services seems like an easy proposition. You offer IT services for companies that don't have the infrastructure to support their own, bundle in services like cloud storage or remote desktop access, then sit back and watch the money roll in.  
Read More
30 Oct 2017

Surprise! A New Cyber Security Compliance Just Took Effect

It's fair to say that what happens in New York affects the entire world. Thousands of companies make their home there, and some of them — Goldman Sachs, JP Morgan Chase, American Express, Citigroup, and others — can affect the economies of entire regions with the flick of a pen. Therefore, it's safe to say that a new cyber security regime , affecting companies under the governance of New York's Department of Financial Services (DFS), would have potentially global ramifications. 
Read More
22 Oct 2017

How to Reduce Your Cyber-Attack Surface Before It's Too Late

Has your attack surface increased as you've moved more workloads to the cloud? While moving to the cloud can be a great idea, it can also be a security headache for IT departments who have not increased their security staff to keep up with the demand. All it takes is one data breach to put your organization at risk and endanger the value that moving to cloud brings.

Read More
11 Oct 2017

What will Software Defined Perimeter Mean for Compliance?

Your network isn't really your network anymore. More specifically, the things you thought of as your network — the boxes with blinking lights, the antennae, the switches, the miles of Cat 5 cable — no longer represent the physical reality of your network in the way that they once did.

Read More
03 Oct 2017

Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

close

Contact Us:

Contact Us: