5 Steps to Doing Automation Right

If 2018 was the year of realizing the promise of automation, then 2019 will be the year that enterprises adopt and implement it across their security and DevOps teams. According to a study conducted by the Ponemon Institute and Juniper Networks in mid… Continue reading 5 Steps to Doing Automation Right

The Anatomy of Website Malware: An Introduction

We see a lot of files infected by website malware on a daily basis here at Sucuri Labs. What we don’t see is very many categories of infections. The purpose of this blog post series is to provide an overview of the most common infection categori… Continue reading The Anatomy of Website Malware: An Introduction

Safer Internet Day: Security vs. Convenience

It isn’t easy to be secure all the time — this is especially true if you are new to cybersecurity. A well-formed security plan takes deliberate effort at the very least, and constant vigilance at most. Even the top experts have room to imp… Continue reading Safer Internet Day: Security vs. Convenience

What does your password say about you?

Using what we security experts call “crappy passwords” can be the first step in a journey to identity theft and all of its attendant miseries.  If you are using Google Chrome to browse the web, a new web extension from Google can help … Continue reading What does your password say about you?

3 pitfalls to avoid when implementing a SOAR solution and what to do instead

At this point, you’ve decided that your security operations center (SOC) is ready for a security orchestration, automation and response (SOAR) solution. You’ve evaluated different SOAR solutions and selected the platform that best suits the… Continue reading 3 pitfalls to avoid when implementing a SOAR solution and what to do instead

Optimize Setup to Improve Your Website Resilience for DDoS Attacks

Distributed denial-of-service (DDoS) attacks can disrupt website traffic and impact any business. To help website owners and webmasters improve their website resilience to DDoS attacks, we have put together a series of posts.
Here are the topics that … Continue reading Optimize Setup to Improve Your Website Resilience for DDoS Attacks

Evaluating a SOAR platform? Make sure to ask your vendor these 11 questions.

#SOAR keeps popping up in top 2019 #cybersecurity predictions. Here’s how to evaluate which solution could work best for you. Top 5 security trends that will continue in 2019. 7 cybersecurity trends to prepare for in 2019. 60 cybersecurity predictions … Continue reading Evaluating a SOAR platform? Make sure to ask your vendor these 11 questions.

Incident Response: 5 Tips to Ensure Your Plan is Ready

There is a common refrain among security industry veterans that it is not a matter of if, but when, a breach or other security incident occurs. Protection and prevention are only one slice of the pie when it comes to a holistic security program. Incid… Continue reading Incident Response: 5 Tips to Ensure Your Plan is Ready

Incident Response: 5 Tips to Ensure Your Plan is Ready

There is a common refrain among security industry veterans that it is not a matter of if, but when, a breach or other security incident occurs. Protection and prevention are only one slice of the pie when it comes to a holistic security program. Incid… Continue reading Incident Response: 5 Tips to Ensure Your Plan is Ready

OWASP Top 10 Security Risks – Part V

To bring awareness to what threatens the integrity of websites, we are continuing a series of posts on the OWASP top 10 security risks.
The OWASP Top 10 list consists of the 10 most seen application vulnerabilities:

Injection
Broken Authentication
Se… Continue reading OWASP Top 10 Security Risks – Part V