What is a cybersecurity strategy and how can a company develop one?
The number of users, devices and resources on enterprise networks is growing exponentially. With this expanding attack surface, a company's assets, intellectual property, reputat...
What is an advanced persistent threat?
As the threat landscape evolves faster than we can keep up with, organizations need to be aware of the type of threats they may face. Certain types of threats, such as ransomware...
How can DPI be used in security?
After the last post where we learned about deep packet inspection (DPI), we will talk about how this tool can be used in security products such as redborder. 1. The DPI exam...
What is deep packet inspection (DPI)?
If you are browsing any website ... If you are sending an email ... If you are watching a movie on Netflix ... If you are making a Skype call or a Zoom meeting ... It...
IoT security: risks and solutions
Internet of Things (IoT) is a term used to describe a system of interconnected computing devices that use the Internet to send and receive data without requiring person-to-device o...
What is data loss prevention?
The threat landscape is an ever-changing one as the number of cyber attacks continues to increase, data exfiltration now accounts for 70% of ransomware attacks and insiders are r...
IoT security analysis: Are your IoT devices secure?
The world of IoT encompasses a wide variety of technologies, vendors and connectivity methods. Although the first things that come to mind when we think of this new technology ar...
DDoS attacks and reflection and amplification techniques
We could say that 2020 has been the resurgence of DDoS attacks, and if 2021 continues like this, the trend will continue strongly. So it's best to be clear on what one of the tec...