Security Monitoring Saves the Day

For the second week of  National Cyber Security Awareness Month, we would like to focus on a very important part in having a good website security posture: monitoring.
How can security monitoring save your day?
Most people only care about their w… Continue reading Security Monitoring Saves the Day

October Cybersecurity Month

Since 2003, October has been recognized as National Cybersecurity Awareness Month. It is an annual campaign to raise awareness about the importance of cybersecurity and being a better digital citizen.
October has just started and a majority of securit… Continue reading October Cybersecurity Month

SSL vs. Website Security

Having a website today is way easier than it was 10 or 15 years ago. Tools like content management systems (CMS), website builders, static site generators and alike remove a lot of the friction around building and maintaining sites. But, is there a pr… Continue reading SSL vs. Website Security

E-Commerce Security – Planning for Disasters

This is the last post in our series on E-commerce Security:

Intro to Securing an Online Store – Part 1
Intro to Securing an Online Store – Part 2

Today, let’s expand on some of the suggestions made during a webinar I hosted recentl… Continue reading E-Commerce Security – Planning for Disasters

How to Improve Your Website Security Posture – Part II

In the first post of this series, we discussed some of the main website security threats. Knowing the website security environment is a vital part of a good website posture. However, it is also important to be aware of what to do to strengthen your we… Continue reading How to Improve Your Website Security Posture – Part II

Back to the Basics: The problem with forcing regular password expiry

For many people and organizations around the world a single password is sometimes the only security control protecting their sensitive information, access to email and even their bank account. The traditional password best practice was to create a long… Continue reading Back to the Basics: The problem with forcing regular password expiry

3 Key Mobile Enterprise Threats in 2018

As attackers constantly innovate new exploitation and evasion techniques, enterprise security teams are having to stay ahead of a host of emerging threats. Often, these threats have been encountered in other enterprises, and shared knowledge of these t… Continue reading 3 Key Mobile Enterprise Threats in 2018

Finding Your Weakness: Triaging Your Domains with SWAT

I have been involved in IT and security in one way or another for almost 30 years.  I have worked full time for organizations and consulted in a wide variety of jobs and responsibilities.  But one of the common issues I have seen and been par… Continue reading Finding Your Weakness: Triaging Your Domains with SWAT