Your company spends a whole lot of money on cybersecurity products, services & solutions. Is your investment paying off? Learn 5 keys to assessing the effectiveness of your security architecture. Your company spends a whole lot of money on cybersecurity products, services, solutions, staff, and consulting. But is your investment paying off? More specifically, what […]
Category Archives Cybersecurity
Read about how network vendors and their customers can finally see comparative results of how advanced security solutions will work under real-world conditions with NetSecOPEN. Fair Testing in an Unfair World. Today’s content-aware security and inspection devices are being put under more demands and pressure than ever before. Network equipment vendors work every possible position […]
The idea of create once, use many is not new in the world of IT. The idea of create once, use many is not new in the world of IT. There is no reason to re-invent the wheel – right? Then why is it not being practiced more diligently? Is it because the consumers of various […]
Amazon Web Services, Cloud-based sevices, CyberFlood Virtual, Currently, cloud-based services are all the rage due to agility, scalability, resiliency and cost reduction benefits that they offer to organizations providing or leveraging those services. Amazon Web Services (AWS) trusted cloud-based infrastructure has those inherent benefits which can help customers in meeting their business goals. The ultimate […]
In today’s connected world, surfing the internet is more than just a pastime, it is now a place where critical functions are performed such as eCommerce, publishing, CRM and video-streaming, just to name a few. In today’s connected world, surfing the internet is more than just a pastime, it is now a place where critical […]
The rush to virtualization and cloud is mainly driven by improved performance and competitiveness that it brings to businesses through rapid, agile and efficient deployment of resources. The rush to virtualization and cloud is mainly driven by improved performance and competitiveness that it brings to businesses through rapid, agile and efficient deployment of resources. Successful deployment and […]
Transport Layer Security has been marked by significant cryptographic breaks and implementation flaws with exploits wreaking havoc upon enterprises. The history of Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) have been marked by significant cryptographic breaks and implementation flaws with exploits wreaking havoc upon enterprises and the public. TLS v1.3 is […]
The momentum for securing more web traffic via encryption is growing at an exponential rate – beyond just the requirement to encrypt user credentials The momentum for securing more and more web traffic via encryption has been growing at an exponential rate – going far beyond just the requirement to encrypt user credentials for access […]
An external network pentest without thorough open source intelligence gathering is just a glorified vulnerability scan. I did an external network pentest for a client a few weeks back that led to some decent pwnage, and as if writing the report wasn’t tiring enough, I decided to do a blog post as well. Go figure. […]
Security is hard to get right, and even in today’s security conscious world, there are a few serious vulnerabilities such as XML External Entity (XXE) that are being overlooked and end up becoming the cause for a breach. An XML External Entity (XXE) attack is a type of computer security vulnerability that is typically found […]
 
 