Why and How DNS Hijacking is Increasing
The IDC Global DNS Threat Report released last summer revealed that 82% of organizations were victims of DNS attacks with each suffering an average of 9 DNS attacks which was
Are Organizations Ready for The California Consumer Privacy Act (CCPA)?
Why Organizations Aren’t Ready for the California Consumer Privacy Act (CCPA) The California Consumer Privacy Act (CCPA) went into effect on January 1st, and many organizations haven’t started preparing to comply
2020 Top 5 Cyber Security Predictions
Top 5 Cyber Security Predictions for 2020 In conversations with industry analysts, our customers, combing through the statistics like Comparitech's breach data and ultimately talking amongst ourselves we came up with
The Best IT Security Blog Posts in 2019
The Top 5 Cybersecurity Blog Posts in Our Library - 2019 We have added 46 Blog Posts to our library over the year or so and wanted to rank the most
The Benefits of Using a SIEM to Improve IT Security
A SIEM’s Role in Network Security Analysis and Monitoring We put together a series of blog posts that deal with Network Security Design and Log Monitoring that are hopefully providing you
Why Log Monitoring and Management is Critical to IT Security
Why Log Monitoring and Management is Critical to IT Security In our last blog post titled “The Fundamentals of Network Security Analysis and Monitoring” we discussed active versus passive security devices,
The Keys to Network Security and Monitoring
The Fundamentals of Network Security Analysis and Monitoring In a Blog Post we wrote titled “Network Security Design is Critical to Eliminating Security Gaps and Reducing Costs” – “The 5 Pieces
Magecart Campaigns are Targeting e-Commerce Websites
Magecart is Threatening Online Businesses this Holiday Season As we suggested in an earlier blog post, there have been 5,183 breaches from the first nine months of 2019 which exposed 7.9
How the California Consumer Privacy Act (CCPA) Will Impact Business
How the California Consumer Privacy Act (CCPA) will Impact Business In a blog post we wrote a few months back called Four Data Protection and Privacy Laws You Must Know we
Patch Management Best Practices
Vulnerabilities and Poor Patching Practices Lead to Breaches In our previous blog posts, which discussed the differences between Vulnerability Scans, Vulnerability Assessments, Vulnerability Management and Penetration Tests we indicated how vital