General types of DDoS attacks
(Part 1) Distributed denial of service (DDoS) is a broad class of cyber attack that disrupts online services and resources by overwhelming them with traffic. This renders...
Five new cybersecurity challenges facing the financial services industry
It has been a mixed year for the financial services sector. Some firms have seen increased demand for their services, while others have struggled to deal with mortgage an...
Combining Tracing, Metrics and Logs for High-Level Cybersecurity
These three elements work together to provide a complete and detailed view of infrastructure behavior and detect any suspicious or anomalous activity that may pose a security thr...
Reasons why you should use network detection and response for your business
In today's digital world, cybersecurity has become a priority for businesses. With cyber threats on the rise, it is crucial for organizations to take effective measures to protect ...
Threats and challenges facing the financial services industry
The year 2020 could be defined as a "changing" year for the financial services sector. Some firms have seen increased demand for their services, while others have struggled to co...
Mental models and safety for good and informed decisions
The thought process of a security professional encompasses many mental models. These do not relate exclusively to hacking or broader technology, but cover principles that have br...
Security alert fatigue and fine-tuning to combat it
Alert fatigue is a real problem in IT security. This can happen at the worst time, when analysts check their tools and see another event, or even another 50-100 events, after the...
Do you know what the main types of access attacks are?
The term access is broad and refers to the manipulation of data, access to a system or the escalation of unauthorized privileges. La recuperación de datos no autorizados es simpl...