How to Improve Your Website Resilience for DDoS Attacks – Part III – WAF

In the first post of this series, we talked about the practices that will optimize your site and increase its resilience to DDoS attacks. In the second post, we focused on caching best practices that can reduce the chances of a DDoS attack taking down… Continue reading How to Improve Your Website Resilience for DDoS Attacks – Part III – WAF

OWASP Top 10 Security Risks – Part IV

To bring awareness to what threatens the integrity of websites, we are continuing a series of posts on the OWASP top 10 security risks.
The OWASP Top 10 list consists of the 10 most seen application vulnerabilities:

Injection
Broken Authenticati… Continue reading OWASP Top 10 Security Risks – Part IV

The Future of Passwords and Password Management in the Enterprise

Passwords have been around for decades now, and they aren’t going away any time soon. And yet, password security best practices have been ignored by many. Too many people and companies are careless with password management, even though they know … Continue reading The Future of Passwords and Password Management in the Enterprise

New Year Tips from Security Professionals

Have you included website security as a part of your new year’s resolutions for 2019?
Here is a quick retrospective on tips some of our team members shared with us throughout the year.
The cost for neglecting security is 10 times greater than th… Continue reading New Year Tips from Security Professionals

Professionally Evil CISSP Certification: Breaking the Bootcamp Model

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”.  It is one of the primary certifications used as a stepping stone in your cybersecur… Continue reading Professionally Evil CISSP Certification: Breaking the Bootcamp Model

Avoid Coal in Your Digital Stocking — Here’s How to Improve Your Security Posture in 2019

As another year ends, it’s time to review your cybersecurity practices from the past year. How can you improve your security posture in 2019?

The post Avoid Coal in Your Digital Stocking — Here’s How to Improve Your Security Posture in 2019 appeared first on Security Intelligence.

Continue reading Avoid Coal in Your Digital Stocking — Here’s How to Improve Your Security Posture in 2019

Compliance is not Security

Many folks get confused about the difference between security and compliance. Many, especially those less technically inclined, assume that fulfilling compliance obligations sufficiently addresses security. Unfortunately, that’s not true as demon… Continue reading Compliance is not Security