Blog

September 6, 2021
Crumbling Perimeter

Technical Security

Your Perimeter is Disappearing

You security perimeter is disappearing. Find out why and what to do about it
 read more
August 23, 2021
MDR, XDR, SOAR in a datacenter

Technical Security

XDR, MDR, SOAR - Acronyms of Cybersecurity Detection & Response

XDR, MDR, SOAR and more! All the acronyms in cybersecurity explained right here.
 read more
December 13, 2018
Person on VPN

Technical Security

7 Commonly Neglected Security Tasks: DMARC, DNS Calls, And More

In this age of digital transformation, IT staff are under incredible pressure to keep up with the breakneck speed of new technology adoption, implementation, and management while trying to maintain usability, productivity, and efficiency. With this reality...
 read more
June 15, 2017
Servers

Technical Security

6 Strategies to Prevent SQL Injection Attacks

Despite the fact that they’ve been around since the 90s, SQL injection attacks are still making headlines. Well-documented by security organizations like the Open Web Application Security Project (OWASP), SQL injection attacks should be well-known...
 read more
May 4, 2017
Computer User

Technical Security

5 Ways to Secure Your Access Control Vulnerabilities

Access control is a complex undertaking, which leaves it ripe for vulnerabilities and risks. Consider these five ways to shore-up your access control security approach and ensure your user permissions and settings aren’t putting you at risk...
 read more

join our email list