DNS over HTTPS’ threat to enterprise security

DNS over HTTPS (DoH) is here, regardless who likes it or not. Unfortunately, a majority of guidance surrounding DoH is centered around individual consumer perspectives. For enterprise security leaders looking to manage the risks of DoH, that hasn’t bee… Continue reading DNS over HTTPS’ threat to enterprise security

December 2019 Patch Tuesday forecast: Make sure to deploy year-end updates

Can you believe another year has passed and we’re approaching the last Patch Tuesday of the year? While I get ready to make another online gift purchase with my credit card, I can’t help but reflect on the security activity over the past twelve months…. Continue reading December 2019 Patch Tuesday forecast: Make sure to deploy year-end updates

The hidden risks of cryptojacking attacks

For any business, privacy and security are a constant concern. The variety and velocity of attacks seeking to infiltrate corporate systems and steal vital business and customer information seem never-ending. Given the very public repercussions of certa… Continue reading The hidden risks of cryptojacking attacks

Avoiding the next breach: Four tips for securing your apps

As security incidents continue to be an ongoing threat to businesses on a daily basis, keeping security procedures up-to-date and avoiding the next breach have become paramount. In the first six months alone in 2019, more than 4 billion customer record… Continue reading Avoiding the next breach: Four tips for securing your apps

How DNS filtering works and why businesses need it

The Domain Name System (DNS) is a cornerstone of the internet. DNS servers connect URL names that humans can read to unique Internet Protocol (IP) addresses that web browsers can understand. Without DNS, we’d all be typing in long, seemingly rand… Continue reading How DNS filtering works and why businesses need it

How are enterprises coping with the security challenges brought on by digital transformation initiatives?

451 Research has polled IT decision makers at 400 larger companies about the current state of cybersecurity in their organizations, the security initiatives they have planned, the challenges they face, and how they are accommodating emerging technologi… Continue reading How are enterprises coping with the security challenges brought on by digital transformation initiatives?

Supply chain examination: Planning for vulnerabilities you can’t control

Seemingly, there are numerous occurrences when the customer’s personally identifiable information stored by an organization’s third-party provider is set loose by malicious intentioned actors. Threats take on many different shapes and sizes and aren’t … Continue reading Supply chain examination: Planning for vulnerabilities you can’t control

Prevent credential stuffing and account takeover attacks with these expert tips

Account takeover and credential stuffing attacks are two security threats that often go hand in hand. Both have become alarmingly prominent: a recent report found that one-fifth of account openings so far in 2019 have been fraudulent. Prevent credentia… Continue reading Prevent credential stuffing and account takeover attacks with these expert tips

5G IoT security: Opportunity comes with risks

Slowly but surely, 5G digital cellular networks are being set up around the world. It will take years for widespread coverage and use to be achieved, so what better time than now for finding a way to ease into it while keeping security in mind? Opportu… Continue reading 5G IoT security: Opportunity comes with risks