Content Security Policy

As a website owner, it’s a good idea to be aware of the security issues that might affect your site. For example, Cross-site Scripting (XSS) attacks consist of injecting malicious client-side scripts into a website and using the website as a pro… Continue reading Content Security Policy

Securing Modern Web Applications: Threats and Types of Attacks

Web Application Firewalls are the most advanced firewall capabilities available to IT teams. Deploying the appropriate WAF is important, especially these days when the security threat landscape is changing so rapidly. In a previous post, we introduced … Continue reading Securing Modern Web Applications: Threats and Types of Attacks

No Shortage of Compelling Topics as RSA Conference 2018 Approaches

Certain things in life are inevitable. Death and taxes. The sun rising in the East and setting in the West. Donald Trump tweeting extemporaneously. Kids growing up and leaving home (okay, so there’s a little hope in that last one.) Here’s another item … Continue reading No Shortage of Compelling Topics as RSA Conference 2018 Approaches

US discusses authorizing cyber attacks outside “war zone”

In a nutshell, traditional definitions of war linked to kinetic action and physical space are being framed as overly restrictive given a desire by some to engage in offensive attacks online. The head of NSA is asking whether reducing that link and auth… Continue reading US discusses authorizing cyber attacks outside “war zone”

What Businesses Can Learn from Verizon’s Annual Data Breach Investigations Report

By Mandy Pattenden, Marketing Communications Director Data breaches, privacy and security concerns are dominating the headlines this…
The post What Businesses Can Learn from Verizon’s Annual Data Breach Investigations Report appeared first… Continue reading What Businesses Can Learn from Verizon’s Annual Data Breach Investigations Report

Facebook spammers making things worse

Adding to Facebook’s burden are two spam campaigns. One is aimed at Finnish users and the other was quickly terminated, but we expect both to resurface in one form or another.
Categories:

Cybercrime
Social engineering

Tags: facebookFaceboo… Continue reading Facebook spammers making things worse

IDaaS Competitors

The Identity-as-a-Service (IDaaS) market is one of the most important in the IT sector. IDaaS solutions are now sitting at the center of most IT networks, and are critical when it comes to controlling access, security, and efficiency. With so much focu… Continue reading IDaaS Competitors

Akamai and Duo have announced a technology partnership for Zero Trust

Akamai continues to build a zero trust ecosystem by integrating it’s Enterprise Application Access (EAA) with Duo’s Multi-Factor Authentication (MFA) solution. Duo now natively integrates into EAA and augments access with push-based MFA, phone call del… Continue reading Akamai and Duo have announced a technology partnership for Zero Trust