Threats

How to Prevent SQL Injection Attacks

First discovered in 1998, SQL injections (SQLi) are still a devastatingly effective attack technique and remain a top database security priority. SQL, or Structured Query...

How to Prevent Ransomware Attacks in 2021

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. A...

How to Prevent Different Types of Malware

Malware, short for "malicious software," is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the...

Protecting Against Solorigate TTPs: SolarWinds Hack Defenses

A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Microsoft has...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

How to Defend Common IT Security Vulnerabilities

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...

Cybersecurity Outlook 2021: Trends and Predictions

Just when it seemed that 2020 couldn't get any weirder, news broke that Russian state-sponsored hackers had spent much of the year exploiting vulnerabilities...

FireEye, SolarWinds Breaches: Implications and Protections

Five days after FireEye detailed the theft of about 300 of its proprietary cybersecurity tools, SolarWinds announced that its Orion IT monitoring platform had...

Tokenization vs. Encryption: Pros and Cons

Two of the most popular methods for protecting business data are tokenization and encryption. However, choosing the one that is the best for your...

Latest articles