By Oliver Pinson-Roxburgh, Alert Logic The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However, security remains a concern, and rightly so. The foundational infrastructure delivered...
Crucial measures to make sure your online accounts are protected
As I’ve mentioned in a previous post, web applications are one of the most attractive targets for hackers because they can be easily reached, have virtually-countless attack vectors, and there are too many ways for...
The advent and growth of social networking systems in recent years has brought dramatic changes to every aspect of our lives. What started out as becoming a simple line of tools that were meant to...
As internet privacy continues to unravel, it is becoming more and more evident that you’re on your own to protect your data against the many parties that are looking to hoard it. Perhaps one of...
Account takeover (ATO) is quickly becoming a go-to vector for malicious actors. Here's how they do it and how you can prevent it.
By Michael Conley Your internet security is something that must be constantly kept under control, but unfortunately for us, this is no easy task. As time goes by, cybercriminals are finding more and more ways to...
Replay attacks, in which attackers intercept and resend network packets that do not belong to them, are extremely dangerous and can in some cases cause serious damage. What makes these kinds of attacks even more...
In a crowded tech jobs market, are businesses doing enough to stand out from the crowd?
Decades of bad incentives have lead to a deteriorating spiral of security down the rabbit hole. Here's what we've learned and what we need to do.