Infosecurity Blogs

The Top Security Vulnerabilities of 2022 and Their Workarounds
Harman Singh outlines the top security vulnerabilities organizations should be aware of from 2022

New Year, New Problems: Why 2023 Could be Another Turbulent Time for Cybersecurity
Adenike Cosgrove sets out her cybersecurity predictions for 2023

Cybersecurity: Trends From 2022 and Predictions For 2023
This review of 2022 examines remote working, supply chain security and regulations
Brought to you by
SecureLink

DDoS Activity Intensifies in Asia Pacific
As DDoS attacks rise in the region, StormWall opens a point of presence in Singapore
Brought to you by
StormWall

How to Recover Exchange Server After Total Failure
Find out how a proactive approach can help you overcome an Exchange Server failure
Brought to you by
Stellar

Why the Holidays are the Most Wonderful Time of the Year for Fraudsters
Just like manufacturers and e-commerce stores, threat actors ready themselves for the busiest time of the year

Top Three Things Organizations Need to Stay Secure in 2023
In this article, Jamf lists three important aspects of solving the security puzzle
Brought to you by
Jamf

DDoS Attacks in 2022: Trends and Obstacles Amid Worldwide Political Crisis
Ramil Khantimirov, CEO and co-founder StormWall, shared his views on the global trends affecting DDoS attacks
Brought to you by
StormWall

#BlackFriday: Preparing for Online Shopping Scams This Holiday Season
Javvad Malik highlights the types of scams consumers should be looking out for this year's holiday shopping season

Template Injection Attacks: Protecting Against Camouflaged URLs
Organizations can no longer rely on traditional security tools to protect against advanced threats

The Enemy Has Deep Pockets: How safe are your user accounts?
Understand the latest techniques bot operators are using to bypass traditional detection methods and what to do to avoid falling victim to an attack
Brought to you by
DataDome

How to be Mindful of Security Threats During the FIFA World Cup
How are cyber-attackers likely to target the upcoming FIFA football world cup, and how can these threats be mitigated?