Blockchain-based VPNs: The Next Step in Privacy Tech?

Could open source bandwidth utilized by blockchain be the alternative to today’s VPN? Every person who goes online today fights a losing privacy battle. Every site we visit, every app we download, every service we subscribe to collects our personal data. The number of places where this accumulates online shows ... Read More
Security Boulevard
cyberinsurance web host

Is Your Web Host Taking Cybersecurity Seriously?

If you’ve read our article on website security tips, and taken all the necessary steps to secure your new website before it goes live, well done. You are clearly taking your own security seriously. Unfortunately, the same cannot be said for many web hosts. And even more, unfortunately, the security ... Read More
Security Boulevard
network BlackBerry digital workplace SASE network Palo Alto Networks HashiCorp

Does Your Organization ‘Get’ Chaos Engineering?

Chaos engineering aims to prevent security issues and outages before they happen. So why aren’t more organizations using it? In many ways, the cloud computing movement has simplified technology infrastructure for organizations across the globe. Instead of having to manually maintain individual servers or run an entire data center on-premises, ... Read More
Security Boulevard
apps cloud appsec mobile app open source apps application security layer

Is Your Smartphone App at Risk of Infecting Users?

The time to bring in security during the application development process should not be right before launch We live in a world of threats. They’re all around us in the real world, in the air and in cyberspace. What can we do when measures we put in place to protect ... Read More
Security Boulevard
Current Cybersecurity Market Strong: What’s Driving It?

Current Cybersecurity Market Strong: What’s Driving It?

Cybersecurity is a big business and it’s going to get bigger. Individual users, small business owners, and IT professionals at international corporations know that threats occur every day. Staying ahead of those threats is the only way to protect proprietary data, network integrity, and network... Read More → The post ... Read More
Setting Up A Self-Signed TLS/SSL Certificate on Apache

Setting Up A Self-Signed TLS/SSL Certificate on Apache

SSL is a fundamental piece of technology when you want to run a protected Apache site. SSL certificates permit you to scramble all the traffic sent to and from your Apache site to keep others from seeing the majority of the traffic. It utilizes open key cryptography to set up ... Read More

How To Clean A Hacked Installation of Nginx

| | articles, Web Security Zone
There are literally hundreds of ways to secure & solidify a Nginx server after an attack. But, what does it REALLY need to be cleaned and secure? What are the essential changes you have to make to feel secure again? To answer that question, we’ll have to investigate what the ... Read More

Setting Up A Free TLS/SSL Certificate With “Let’s Encrypt”

SSL is short for secure sockets layer, which is an encryption standard that is used to encrypt data going between the browser in the server. In other words, an SSL protects data submitted on your site via visitors and customers. You set up SSL by adding an SSL certificate to ... Read More

How To Protect Your Website Against A Cross-Site Scripting (XSS) Attack

One of the most common methods that hackers use/will use to attack your website is a cross-site scripting (XSS) attack. Basically, an XSS attack is where a hacker will take advantage of an XSS vulnerability to execute a malicious JavaScript when users visit your website. The consequences of an XSS ... Read More

6 Simple Ways To Protect Your Website From Hackers

If there’s one specific reason why website owners don’t take steps to boost their online security to protect their blogs and websites from hackers, it’s usually because they believe one of two things: They don’t believe their website or blog has anything worth of real value to hackers They don’t ... Read More

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)