SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corpor… Continue reading SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

7 Tips for Protecting Your Website

For many people, website security is an intimidating topic. It seems like there’s an endless list of things necessary for protecting your website. And while resources like our Website Security Guide cut through much of the clutter of the threat … Continue reading 7 Tips for Protecting Your Website

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

Just five years ago, the Public Key Infrastructure, or PKI, was seriously fraying at the edges and appeared to be tilting toward obsolescence. Things have since taken a turn for the better. Related: Why PKI is well-suited to secure the Internet of Thin… Continue reading MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

It was just a few short years ago that the tech sector, led by Google, Mozilla and Microsoft, commenced a big push to increase the use of HTTPS – and its underlying TLS authentication and encryption protocol. Related: Why Google’s HTTPS pus… Continue reading MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

Abused Cloudflare Workers Service Used to Inject Korean SEO Spam

We were recently contacted by a website owner about some malicious injected spam links that were being indexed by Google’s search engine crawler Googlebot.
What was especially frustrating for the website owner was that these spammy links were no… Continue reading Abused Cloudflare Workers Service Used to Inject Korean SEO Spam

Tufin Unifies Management of Cloud Cybersecurity Policies

Tufin today announced the availability of Tufin SecureCloud, which combines two existing offerings to manage cybersecurity policies for both monolithic applications and emerging microservices-based application environments. Company CTO Reuven Harrison… Continue reading Tufin Unifies Management of Cloud Cybersecurity Policies

6 Simple Steps for Hardening your WordPress Security

Having a secure WordPress site does not need to be a challenge. Hardening a website means adding security layers to reduce the risks of attacks and hacks.
6 ways to Harden WordPress Security
You can harden your WordPress site by following these six si… Continue reading 6 Simple Steps for Hardening your WordPress Security

It’s Okay, We’re All On the SameSite

With Google’s recent announcement that all cookies without a SameSite flag will be treated as having SameSite=Lax set by default in Chrome version 80, surely Cross-Site Request Forgery will be dead? Well, not quite… In this post I’m g… Continue reading It’s Okay, We’re All On the SameSite

GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical systems, and people are protected. An effective cyb… Continue reading GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime