Cloud Security

Is IT security under attack?

From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough…

8 hours ago

How the Crypto Challenge as Action Helped a Major Airline Reduce False Positives While Protecting the Customer Experience

Challenges of Bot Detection: Keeping Defenses High Without Triggering False Positives Identifying bots is important and complicated work. Keeping up…

11 hours ago

Getting IAST Results from DAST Testing

IAST is one of the latest buzzwords in security testing, and now required as part of the NIST SP800-53 Revision…

18 hours ago

How Containers Support the IT-OT Convergence

The worlds of information technology (IT) and operational technology (OT) are colliding. In July 2019, Automation.com cited a survey finding…

2 days ago

4 Considerations for a Secure Cloud Environment

Digital attackers are increasingly turning their attention to the cloud. According to the 2020 Trustwave Global Security Report, the volume…

2 days ago

PolarProxy in Podman

Podman is a daemonless Linux container engine, which can be used as a more secure alternative to Docker. This blog…

2 days ago

2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original

As you might imagine, as the go-to enterprise DDoS mitigation experts, our phones have been "ringing off the hook" as…

2 days ago

7 Common Data Misconfigurations for Google Cloud Platform

Seven Common Data Misconfigurations for GCP — and How to Avoid Them Just about every process in the Google Cloud…

3 days ago

Here’s Why We Need to Stay Safe in the New Contactless Economy

Now is the time to secure the digital experience by understanding the gaps in cloud security posture. The post Here’s…

3 days ago

Old Story: Leaked Voter Records

My previous posting on the Proud Boys spam email speculated that voter records were widely available for such purposes. Here’s…

3 days ago