Log4Shell is the worst security issue of the decade: what you should do

Log4Shell is the worst security issue of the decade: what you should do

| | Cybersecurity
Last week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation actions. I see that the Log4Shell vulnerability, which has transformed into multiple vulnerabilities, is going to stay with us for a while. So, here is an update of what we know so far, with the latest ... Read More
Ten common causes of downtime and how to avoid them (Google Cloud Next '17)

Understanding user intent – the panacea for mission-critical application QoE issues

In this blog post, we would like to continue our discussion about the panacea for mission-critical application QoE issues. Since analogies from the actual world of traffic to the world of IT network traffic serve us well to explain the pains and optional solutions, we’ll also continue to use them ... Read More
How to protect against the weakest link in cybersecurity – THE USERS

How to protect against the weakest link in cybersecurity – THE USERS

Cyberattacks continue to grow year over year. An astounding 5,126,930,507 breached records in 2021 represent an 11% increase in security incidents compared to 2020, based on IT governance analysis. Security professionals are in a constant battle to improve organizational security posture and prevent risks across all potential attack surfaces. Web ... Read More
Why DDoS is still a major attack vector and how to protect against it

Why DDoS is still a major attack vector and how to protect against it

The first massive, documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon and eBay. These attacks used computers at multiple locations to overwhelm the vendors’ computers and shut down their ... Read More
Log4Shell is the worst security issue of the decade: what you should do

Log4Shell is the worst security issue of the decade: what you should do

Last week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation actions. I see that the Log4Shell vulnerability, which has transformed into multiple vulnerabilities, is going to stay with us for a while. Just yesterday, December 28th, yet another remote code execution vulnerability was discovered again in ... Read More
Log4j: what you need to know

Log4j: what you need to know

| | Cyber Security, Uncategorized
There is never a dull moment in the information security space. It’s a constant battle between adversaries and cyber security experts. But, every now and then, there is a major security event or discovery of a new critical zero-day vulnerability that can literally break the internet. The Log4j zero-day vulnerability, ... Read More

Secure Guardrails