network-based security

5 Ways to Avoid a Ransomware Attack
“Ooops, your files have been encrypted!” That’s the dreaded message that greeted people hit with the 2017 WannaCry ransomware attack. Hundreds of thousands of computers were infected and many people lost their ...

What is the CIA Triad: Confidentiality, Integrity, & Availability
Visibility & Control: The keys to the kingdom of information security and network function integrity Ask any security practitioner how to start designing network infrastructure for security and they will tell you ...

Cybercrime – When Consumers Feel Like Victims, Operators Come to The Rescue
Yes, it’s unfortunate, but it’s often been said that there are two types of cybercrime victims – those who have fallen prey to the wily ways of cyber criminals, and those who ...