Costly DNS Attacks on the Rise
While awareness of DNS security continues to grow, the cost, frequency and number of attacks remain high, while the pandemic and resulting hybrid work environments have resulted in huge disruption for organizations ...
.NET 5, Source Generators, and Supply Chain Attacks
IDEs and build infrastructure are being a target of various threat actors since at least 2015 when XcodeGhost has been discovered - https://en.wikipedia.org/wiki/XcodeGhost - malware-ridden Apple Xcode IDE that enabled attackers to plant malware in iOS applications built ...
Any Port in a Storm: Ports and Security, Part 2
In part one of this series, we had a crash course in port numbers and why they matter for network connectivity. Now, let's put things into perspective: Why does this information matter ...
Akamai Acquires Guardicore for Microsegmentation Platform
Akamai Technologies today announced it has acquired Guardicore, a provider of a platform that enables IT teams to microsegment application workloads to limit the blast radius of any malware infestation, for approximately ...
Get to Market Quicker with LimaCharlie
LimaCharlie offers cybersecurity tools and supporting infrastructure billed based solely on usage in a scalable way. It is an approach that nobody else is taking. One that enables some pretty exciting possibilities ...
Domain Risk Management – Discovering the threats
Part 2 of our 3-part blog series outlining the practice of effective and scalable domain risk management - Part 2: Tools ...
Challenges Securing the Edge
Cybersecurity is all about protecting data, but it’s clear organizations need to make a greater effort to protect that data where it is, not where they’d like it to be or think ...
OWASP Top 10 2021 Released
The Open Web Application Security Project (OWASP) is a not-for-profit organisation that aims, through community-led open-source projects, to improve the security of web-based software. OWASP develop and manage a public... The post ...
Top 6 Questions to Ask When Selecting SSL Protection Solutions
There is no one-size-fits-all solution for SSL protection. Each organization has its own unique priorities, business needs, sensitivities, and privacy needs. The post Top 6 Questions to Ask When Selecting SSL Protection ...
Any Port in a Storm: Ports and Security, Part 1
Dropping Anchor When IT and Security professionals talk about port numbers, we're referring to the TCP and UDP port numbers a service is running on that are waiting to accept connections. But ...