Sicurezza

Online Security Concerns Split UK Black Friday Shoppers

Pubblicato il

Shopping online on Black Friday Weekend can be a great way of getting the best deal as retailers slash prices across their range. But as security risks mount and hackers continue to target consumers’ personal data, could shoppers turn their backs on online stores and return to more traditional, secure methods? To understand UK consumers’ […]

Sicurezza

Growing Your Business: Security as an Expectation

Pubblicato il

Who is responsible for my device and application security? This is a critical question in today’s growing threat landscape, and one without a clear answer. Despite increases in demands for mobile app and connected device security features, no key players—device manufacturers, consumers, mobile carriers or organizations that consumers do business with via devices—will take responsibility. […]

Sicurezza

Simple to Use Link Availability Solutions

Pubblicato il

Previously, I discussed how rerouting data center host infrastructure should be part of next-generation DDoS solutions.  In this blog, I will discuss how link availability solutions should also play a part. Traditional DDoS solutions offer us a measure of protection against a number of things that can disrupt service to our applications or environment. This […]

Sicurezza

The Delta Airlines Security Breach: A Case Study in How to Respond to a Data Breach

Pubblicato il

Recent data breaches against Panera Bread, Delta Airlines, Sears, Saks, and Lord & Taylor highlight a lot: the need for improved web application and internet security processes, better accountability, and why cybersecurity is critical to securing the loyalty of an organization’s most valued customers. But perhaps most importantly, it highlights how an organization should react […]

Sicurezza

Using Application Analytics to Achieve Security at Scale

Pubblicato il

Are you overwhelmed by the number of security events per day? If so, you are not alone. Alert Fatigue is Leaving You Exposed It is not uncommon for security administrators to receive tens of thousands of security alerts per day, leading to alert fatigue – and worse – security events going unattended. Tellingly, a study […]

Sicurezza

Disaster Recovery: Data Center or Host Infrastructure Reroute

Pubblicato il

Companies, even large ones, haven’t considered disaster recovery plans outside of their primary cloud providers own infrastructure as regularly as they should. In March of this year, Amazon Web Services (AWS) had a massive failure which directly impacted some of the world’s largest brands, taking them offline for several hours. In this case, it was […]

Sicurezza

Protecting Sensitive Data: A Black Swan Never Truly Sits Still

Pubblicato il

The black swan – a rare and unpredictable event notorious for its ability to completely change the tides of a situation. For cybersecurity, these nightmares can take the form of disabled critical services such as municipal electrical grids and other connected infrastructure networks, data breaches, application failures, and DDoS attacks. They can range from the […]

Sicurezza

The Origin of Ransomware and Its Impact on Businesses

Pubblicato il

In previous articles we’ve mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. In this article, we’ll start with the basics and describe what ransomware is and how it is used by cybercriminals to attack tens of thousands of systems by taking advantage of system-vulnerabilities. [You might also […]