How to Start Tracking Your Application Dependencies

Photo by Luis Gomes from Pexels
Do you know what dependencies your app is using? All of them? We recently wrote about managing npm dependencies, but Node.js developers aren’t the only ones who rely on third-party libraries, APIs, and more in their appl… Continue reading How to Start Tracking Your Application Dependencies

BEST PRACTICES – 9 must-do security protocols companies must embrace to stem remote work risks

Technology advancements have made it relatively easy for many employees to carry out their regular job duties from the comfort of their home.
Related: Poll confirms rise of Covid 19-related hacks
This is something companies are under pressure to allow … Continue reading BEST PRACTICES – 9 must-do security protocols companies must embrace to stem remote work risks

UCEPROTECT: When RBLs Go Bad

Realtime Blackhole Lists (RBLs) can be a great tool in your security arsenal. You may not know you’re using them, but all email providers and company email servers leverage these services to verify whether servers and IP addresses are sending spam or … Continue reading UCEPROTECT: When RBLs Go Bad

Optimizing Performance and Behavior with WordPress and the Sucuri WAF

Aside from providing significant protection from a wide range of threats, the Sucuri WAF also acts as a CDN due to its caching capabilities and regional PoPs — often performing even better than dedicated CDNs based on recent tests.
CDNs can significan… Continue reading Optimizing Performance and Behavior with WordPress and the Sucuri WAF

Building a Framework to Assess the Total Cost of Cloud IT Infrastructure

JumpCloud and MSP Altitude Integrations team up to help you understand the TCO of traditional directory infrastructure versus a cloud-forward directory.
The post Building a Framework to Assess the Total Cost of Cloud IT Infrastructure appeared first on… Continue reading Building a Framework to Assess the Total Cost of Cloud IT Infrastructure

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

Today’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects for years to come.
Related: Web apps are … (more…)
The post GUEST ESSAY:… Continue reading GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

OWASP API Security Top 10: A Framework for Improving Your API Security Efforts

During a recent API Security conversation with a customer, I asked if they had seen the OWASP API Security Top 10 list. They had not heard about it yet, a response that is consistent with other customers as well as from industry analysts including Gart… Continue reading OWASP API Security Top 10: A Framework for Improving Your API Security Efforts

Defending Against State and State-Sponsored Threat Actors

State and state-sponsored threat actors are the apex predators of the cybersecurity world.   Continue reading Defending Against State and State-Sponsored Threat Actors