Why you should care about HTTPS

Why you should care about HTTPS

One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple as looking at your URL bar to check whether the URL string starts with “https” and whether there is a symbol of a closed padlock beside it.

Why should I use private browsing?

Why should I use private browsing?

You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network where the exchange of information is often difficult to track. Here are some good reasons to “go incognito”. With the headlines about data breaches and cyberattacks greeting […]

Three Cyber Threat Hunting Myths

Three Cyber Threat Hunting Myths

In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat hunting is the process of proactively and iteratively searching through your network to detect and isolate advanced threats that evade existing security solutions.

The most pressing data concern in 2019

The most pressing data concern in 2019

Around this time every year, I always see an influx of the top trends in technology. It seems like the perennial hot topic is security, with good reason as each year the number of incidents and evolving creativity with which these attacks are orchestrated contribute to an increase in the sheer magnitude of losses.

Five common misconceptions about DDoS

Five common misconceptions about DDoS

In my first blog on distributed denial-of-service (DDoS) detection, “DDoS: It’s Not a Matter of If, But When,” I provide a brief understanding why someone might initiate a DDoS attack and outlined the three variations of attacks.

In part two of this series, I refute five commonly held misconceptions about DDoS. I don’t mean to scare you, but DDoS attacks have been documented to cause “beaucoup” damage to organizations around the globe.

What is Single Sign-On and who is it for?

What is Single Sign-On and who is it for?

An average enterprise uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge problem for both users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let’s dive into how it works.

How surveillance is transforming these top six industries

How surveillance is transforming these top six industries

Surveillance is rapidly changing across the world, and the technology supporting it is getting pretty complex fast. Gone are the days of analog cameras and single-person control rooms. Today, effective surveillance spans an interconnected, intelligent ecosystem of high-definition imaging, multi-modal sensors, data-sharing networks, and powerful analytics—a combination resulting in insights derived from digital images and video, otherwise known as “computer vision.