Image Credit: https://images.unsplash.com/photo-1550751827-4bd374c3f58b Cyber threats are commonplace, and every business that operates online is at risk. Regardless of the cybersecurity measures they have in place, there is a chance that...
Category: Network Security
Credit: https://www.pexels.com/photo/person-with-mask-sitting-while-using-a-computer-5380610/ Malware attacks are a massive threat to businesses of all sizes across industries. Cybercriminals use malware to illegally gain access to enterprise networks and computer systems, steal critical...
Are you looking for a comprehensive answer to the question, “Why do I need to use a VPN?” Read a few applications of VPN (Personal VPN) below. But first, What...
What are Web Scraping Bots? There are computer programs that automatically visit a website and copy information like content, price, etc. on some/all web pages and pass it on to...
Check Point, in its recent blog post, has reported a vulnerability in existing media player apps like VLC, Kodi, etc. using which an attacker can try and take complete control...
What are Internal Network Segmentation Firewalls? Most firewalls are placed on the edge of the network, and with a good reason. But what happens once a threat/malicious code passes through...
DNSSEC (Domain Name Systems Security Extensions) is a set of protocols added to the DNS protocol to enhance security. It serves the following main functions – Authenticates and certifies that...
What is Ransomware? Ransomware is a malware/malicious software program designed to block or disable access to the data your computer. The program displays a full-screen message on your screen claiming...
Network Sandbox is a technology that enables organizations to analyze, identify and block zero-day attacks and unknown malware, even before a signature is created for them. Most protection methods depend on...
When we think of remote access, we think of VPN. But is VPN the only option? Why not use encrypted RDP, especially for giving temporary remote access to non-mobile workers?...
Security concerns are often cited as a reason for not hosting enterprise applications/data on the public cloud. In this post, let’s have a glimpse at the level of security offered...
Malware, Rootkits & Botnets – A Beginner’s Guide, written by Christopher C. Elisan, offers a good introduction to information security. Written in a simple language, this book should be useful...
Penetration Testing is the name given to methodologies used to test networks, applications, and even people, for security holes. It is done by trained professionals who identify security vulnerabilities in the...
What is a honeypot? A honeypot is an isolated and vulnerable system that is deliberately kept in the network in order to attract attackers, study their method of attacks and...