What’s in a WAF?
November 21 2019Need a 101 lesson on Web application firewalls? Here’s your crib sheet on what a WAF is, how it works, and what to look for when you’re in the...
Read moreNeed a 101 lesson on Web application firewalls? Here’s your crib sheet on what a WAF is, how it works, and what to look for when you’re in the...
Read moreOnline shoppers need to be wary about domain spoofing, fraudulent giveaways, and other scams, ZeroFOX study shows. Retailers aren’t the only ones looking forward to a busy holiday shopping...
Read moreOnline shoppers need to be wary about domain spoofing, fraudulent giveaways, and other scams, ZeroFOX study shows. Retailers aren’t the only ones looking forward to a busy holiday shopping...
Read moreWhy businesses need guidelines for managing their employees’ personal information — without compromising on security. Consumer privacy has long been the focal point of controversies regarding how companies handle...
Read moreWhy businesses need guidelines for managing their employees’ personal information — without compromising on security. Consumer privacy has long been the focal point of controversies regarding how companies handle...
Read moreA 21-year-old Illinois man was sentenced last week to 13 months in prison for running multiple DDoS-for-hire services that launched millions of attacks over several years. This individual’s sentencing...
Read moreA 21-year-old Illinois man was sentenced last week to 13 months in prison for running multiple DDoS-for-hire services that launched millions of attacks over several years. This individual’s sentencing...
Read moreHello, everyone. This is Susan Bradley for CSO Online. Over the weekend, I dealt with a misbehaving server that reminded me that no matter how small or how large...
Read moreHello, everyone. This is Susan Bradley for CSO Online. Over the weekend, I dealt with a misbehaving server that reminded me that no matter how small or how large...
Read moreSIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI. The growing adoption of multifactor authentication (MFA) has resulted...
Read more
Recent Comments