How to mitigate an HTTP request smuggling vulnerability
TAGS: HTTPS | vulnerability management | vulnerability testing Load balancers play a crucial role in modern web architectures. In addition to managing the routing of traffic, they also …Continue reading →
The VPN Is Obsolete. Here’s What to Do Instead.
TAGS: VPNs The virtual private network has been a vital enabler of remote work for decades. But the technology, invented in 1996, …Continue reading →
Stateful vs. stateless firewalls: Understanding the differences
TAGS: firewalls | stateful firewall | stateless firewall When considering stateful vs. stateless firewalls, the distinction between the two approaches may sound minor but is actually quite significant. …Continue reading →
Navigate the DOD’s Cybersecurity Maturity Model Certification
TAGS: cybersecurity | cybersecurity skills | DOD In January, the U.S. Department of Defense released the Cybersecurity Maturity Model Certification requirements, outlining new cybersecurity stipulations for DOD …Continue reading →
Secure Your VPN, No Matter What
TAGS: VPN | VPN Security Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →
3 key identity management tips to streamline workflows
TAGS: identity management Identity management is one of the most complex activities undertaken by any IT organization. The nature of the work requires …Continue reading →
How to Stop Phishing Attacks
TAGS: cybersecurity | phishing Most successful attacks begin with a simple message. Here is what every organization should know about eliminating email-based malware. How …Continue reading →
Comparing single cloud vs. multi-cloud security challenges
TAGS: cloud computing | cloud security Organizations across industries rely on public cloud computing for a significant portion of their workloads. The flexibility, cost efficiency, redundancy …Continue reading →
Tech Tips for Colleges Using Zoom for Remote Learning
TAGS: college | Higher education | remote learning | Zoom Last summer, I had the opportunity to teach an undergraduate course in my university’s online summer program. I took a …Continue reading →
3 Tips for Protecting a VPN in the Face of Major Vulnerabilities
TAGS: VPN Security | VPNs | vulnerability scanning Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →