OWASP Top 10 Security Risks – Part IV

To bring awareness to what threatens the integrity of websites, we are continuing a series of posts on the OWASP top 10 security risks.
The OWASP Top 10 list consists of the 10 most seen application vulnerabilities:

Injection
Broken Authenticati… Continue reading OWASP Top 10 Security Risks – Part IV

My Website Was Hacked on Christmas Eve

Christmas is a wonderful time to spend with family and friends. A lot of kids look forward to opening their presents under the Christmas tree, but not all of them have a present to open. This is why our family started a charity project in 2007 called … Continue reading My Website Was Hacked on Christmas Eve

What is Phishing?

Phishing is a serious threat to any industry. We have seen this topic appear in the news more each day. You might have already received a fraudulent email from what seemed to be your bank or even seen the hacking that took place during the 2016 U… Continue reading What is Phishing?

Navigating Data Responsibility

As we take a step back and think about how much the Internet has grown over the past 20 years, we realize how much content/data has been made available to everyone.
Moving forward, there’s no reason to expect data availability to slow down. In f… Continue reading Navigating Data Responsibility

A Scam-Free Cyber Monday for Online Businesses

Every year we see an increase in website attacks during the holidays. 
While business owners see their sales go up due to promotional Black Friday and Cyber Monday campaigns, hackers are in the background working nonstop to create malicious,&#160… Continue reading A Scam-Free Cyber Monday for Online Businesses

PCI for SMB: Requirement 9 – Implement Strong Access Control Measures

Welcome to the sixth post of a series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessment Questionn… Continue reading PCI for SMB: Requirement 9 – Implement Strong Access Control Measures

Real-Time Fine-Tuning of the WAF via API

Though the Sucuri Firewall is simple to set up and protects your website immediately, it’s possible to have granular control of the WAF by using an API.
For instance, there’s a specific filter inside the WAF dashboard called Emergency DDoS… Continue reading Real-Time Fine-Tuning of the WAF via API

OWASP Top 10 Security Risks – Part II

It is National Cyber Security Awareness Month and in order to bring awareness to what threatens the integrity of websites, we have started a series of posts on the OWASP top 10 security risks.
The OWASP Top 10 list consists of the 10 most seen applica… Continue reading OWASP Top 10 Security Risks – Part II