
Log4Shell is the worst security issue of the decade: what you should do
Last week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation actions. I see that the Log4Shell vulnerability, which has transformed into multiple vulnerabilities, is going to stay with us for a while. So, here is an update of what we know so far, with the latest ... Read More

Understanding user intent – the panacea for mission-critical application QoE issues
In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT network traffic serve us well to explain the pains and optional solutions, we’ll also continue to use them ... Read More

How to protect against the weakest link in cybersecurity – THE USERS
Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are in a constant battle to improve organizational security posture and prevent risks across all potential attack surfaces. Web ... Read More

Why DDoS is still a major attack vector and how to protect against it
The first massive, documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon and eBay. These attacks used computers at multiple locations to overwhelm the vendors’ computers and shut down their ... Read More

Log4Shell is the worst security issue of the decade: what you should do
Last week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation actions. I see that the Log4Shell vulnerability, which has transformed into multiple vulnerabilities, is going to stay with us for a while. Just yesterday, December 28th, yet another remote code execution vulnerability was discovered again in ... Read More

Log4j: what you need to know
There is never a dull moment in the information security space. It’s a constant battle between adversaries and cyber security experts. But, every now and then, there is a major security event or discovery of a new critical zero-day vulnerability that can literally break the internet. The Log4j zero-day vulnerability, ... Read More