This is my own personal experience, a story about looking for and finding the best SSH client for my Android phone. My requirements were the following: I was looking for a free SSH client for Android 14 with agent forwarding. By agent forwarding, I mean that I want to be able to connect to a server, and from that server, I want to be able to connect to another server. For that, you need agent forwarding; otherwise, you will [...]
Category Archives: Web Security
Blockchain is an emerging technology that has grown in popularity with innovators and solution architects over the past few years. With real-world use cases that range from the confidential sharing of medical data to supply chain monitoring, this platform offers any organization a secure system to store and retrieve transactional information.
At its core, blockchain is a database. It differs from traditional databases by the method it uses to store and retrieve information. As it records data in virtual blocks, [...]
SDP, VPN, or Hybrid are three models organizations can leverage to strengthen their cybersecurity. As securing the perimeter of your network is a fundamental requirement for any organization, enterprises need to ensure they adopt the best possible approach. Not only do you have to ensure you protect your systems from unauthorized access, but you also need to provide users with the ability to work from anywhere, at any time.
Although remote work is increasing, it is not a new [...]
Data broking is a big business in today's online digitally-driven world. As the world continues to embrace technology to improve efficiency, access knowledge, drive communication, and enhance collaboration, the production of vast quantities of data is either a direct or indirect collateral effect of any digital interaction. In 2017, the Economist stated that data is more valuable than oil. Although it may seem unusual to put a price tag on an intangible asset created by simple online interactions, the [...]
End-to-End
Encryption (E2EE) ensures the confidentiality and privacy of the parties to a
particular communication. Irrespective of the medium chosen, be it text, voice,
or video, this technology prevents third-parties from accessing any interaction
while it is in transit or at rest. As the vast majority of today's
intercommunication occurs across the Internet, encrypting your information is
vital. Users typically leverage a variety of third-party apps and services to
interact with their friends, family, and colleagues. Due to the sensitive
nature of most interpersonal communications, it is [...]
The Dark Web is a controversial topic that is shrouded in mystery for many regular Internet users. Portrayed in the media as a seedy underground virtual reality where cybercriminals roam free and peddle their illicit wares, this encrypted network has been a newsworthy subject since its rise to infamy during the last decade. Although the Dark Web may appear to be a prohibited playground hosting illegal products and services, one cannot ignore its use in the fight for online [...]
Securing
your website is vital in today's ever-evolving threat landscape. New
cyberattacks, unauthorized intrusions, and data breaches emerge daily, placing
both your business and customers at risk. As your website is the public face of
your enterprise, it presents the perfect target to motivated attackers. Finding
the perfect balance between security and functionality is vital to the
usability of your site. You need to ensure potential customers can access your
website rapidly and efficiently. However, you also need to implement security
measures to protect them, your data, [...]
Cyberwar is a genuine threat to every person, organization, and nation-state. In today's digitally driven society, every system that helps us navigate, participate and compete in the digital age relies on the availability and unhindered functionality of technology. Classical warfare doctrine, such as the treatise written by Sun Tzu, states that the supreme art of war is to subdue the enemy without fighting. The objectives stated by Sun Tzu have become a reality as warfare evolves in the digital [...]
Cache
Poisoned Denial of Service is an attack vector that disables valid user access
to online resources and websites. As caching plays a vital part in the delivery
architecture of most web applications, attacks against this infrastructure
component can have a significant impact on the availability of an online
service.
Implementing caching, whether it be on your origin server or by leveraging the services of a Content Delivery Network, is a proven strategy that enhances the end-user experience. By improving page-load speeds, not only [...]
Securing
and protecting your website is vital for every business, individual, or service
that has an online presence. Even though you may believe your site holds
nothing of value, every webserver is a prime target for hackers. Using
automated scripts, criminals and syndicates scour the Internet looking for
vulnerable websites they can compromise. Once they have managed to breach your
platform’s security, they then leverage your service to host illegal sites,
send spam, and distribute malware to unsuspecting victims.
Implementing
security measures to protect your website requires [...]