Announcing the Enterprise Web Security Best Practices Whitepaper

If your enterprise has a fully-manned web security team, you can consider yourself lucky, at least for now. Cybersecurity Ventures predicts that by 2021, there will be 3.5 million unfilled cybersecurity job positions. To realize how many people this me… Continue reading Announcing the Enterprise Web Security Best Practices Whitepaper

WordPress Hacks: 5 Ways to Protect WordPress from Hacking

WordPress is one of the most popular content management systems (CMS) out there. That’s why it is vital to prevent WordPress hacking.
Statistically, over 33% of websites currently run on WordPress.
This post is not a “one size fits all&#82… Continue reading WordPress Hacks: 5 Ways to Protect WordPress from Hacking

What Is Single Sign-On (SSO)?

The question “what is single sign-on?” is one we get asked a lot. To understand this solution, consider an analogy: “Imagine going to the mall, and at each store you must register with the store for your first purchase. Then, every time aft… Continue reading What Is Single Sign-On (SSO)?

Taming the Jungle: Hardening your AWS infrastructure

After nine tutorials, sixteen posts on stack overflow, and several hours or workweeks of effort you’ve finally done it. You’ve finally got something in Amazon Web Services (AWS) to work as expected. It could have been something as simple as… Continue reading Taming the Jungle: Hardening your AWS infrastructure

Security at Scale: Grow Your Security, Not Your Risk

As a company grows, its security must grow with it. Here’s how companies can scale their security to match their growth All businesses want to become the next big thing, but with great success often comes greater security issues. How does a comp… Continue reading Security at Scale: Grow Your Security, Not Your Risk

Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world. Continue reading Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter

Who is Responsible for the Security of Your Website?

On a daily basis at Sucuri, we hear things like:
“My host takes care of my website security.”
“I have never been hacked, so why should I care?”
Or here’s a personal favorite:
“I’ll take care of it if (when) it… Continue reading Who is Responsible for the Security of Your Website?

Everything Is Best When It Comes to Cybersecurity Best Practices

How can security professionals keep up with cybersecurity best practices without taking too much time away from other responsibilities?

The post Everything Is Best When It Comes to Cybersecurity Best Practices appeared first on Security Intelligence.

Continue reading Everything Is Best When It Comes to Cybersecurity Best Practices

How to Protect WordPress Websites from SQL Injection

If you are one of the many who are using WordPress as a content management system (CMS) for your website, it’s important to be aware of SQL injection threats that could take down your business. SQL injection is a common threat, as SQL is the mos… Continue reading How to Protect WordPress Websites from SQL Injection

What your login success rate says about your threat surface

One of the problems with imitation attacks such as sophisticated credential stuffing is that they are designed to blend in with legitimate traffic. How can you measure something that you can’t detect? Fear-mongering marketing compounds this probl… Continue reading What your login success rate says about your threat surface