Raising Awareness: WPBeginner Spotlight

We’re dedicated to creating the best website security guides and professional services. One way we get our message out is by partnering with open-source CMS communities, web devs, and industry professionals.
Small businesses and bloggers don&#82… Continue reading Raising Awareness: WPBeginner Spotlight

Joomla! Security Best Practices: 12 Ways to Keep Joomla! Secure

At Sucuri, we’re often asked how website owners and webmasters can secure their websites. However, most advice can often be too broad; different content management systems (CMS) exist in this ecosystem, and each requires a unique security config… Continue reading Joomla! Security Best Practices: 12 Ways to Keep Joomla! Secure

SHARED INTEL: Here’s one way to better leverage actionable intel from the profusion of threat feeds

Keeping track of badness on the Internet has become a thriving cottage industry unto itself. Related: ‘Cyber Pearl Harbor’ is upon us There are dozens technology giants, cybersecurity vendors, government agencies and industry consortiums th… Continue reading SHARED INTEL: Here’s one way to better leverage actionable intel from the profusion of threat feeds

MY TAKE: Poll shows senior execs, board members grasp strategic importance of cybersecurity

A singular topic has risen to the top of the agenda in executive suites and board rooms all across the planet: cybersecurity. Related: Security, privacy fallout of IoT A recent survey by Infosys, a tech consulting and IT services giant based in Bangalo… Continue reading MY TAKE: Poll shows senior execs, board members grasp strategic importance of cybersecurity

Why You Need a Cyber Hygiene Program: Q&A with Alert Logic’s Jack Danahy

In the aftermath of a data breach, organizations must answer many questions. But what often isn’t asked is how effective or efficient its cyber hygiene program is, and what role it will play in mitigating future threats. A cyber hygiene program … Continue reading Why You Need a Cyber Hygiene Program: Q&A with Alert Logic’s Jack Danahy

NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

Hear about the smart toaster that got attacked three times within an hour after its IP address first appeared on the Internet? That experiment conducted by a reporter for The Atlantic crystalizes the seemingly intractable security challenge businesses … Continue reading NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

How to Audit & Cleanup WordPress Plugins & Themes

In an interview with Smashing Magazine our CoFounder (now Head of Security Products at GoDaddy) Tony Perez was asked the following question.
What Makes WordPress Vulnerable?
“Here’s the simple answer. Old versions of WordPress, along with … Continue reading How to Audit & Cleanup WordPress Plugins & Themes