Category Archives: Web Security

ConnectBot Logo
31 May 2024
This is my own personal experience, a story about looking for and finding the best SSH client for my Android phone. My requirements were the following: I was looking for a free SSH client for Android 14 with agent forwarding. By agent forwarding, I mean that I want to be able to connect to a server, and from that server, I want to be able to connect to another server. For that, you need agent forwarding; otherwise, you will [...]
Blockchain CDN
30 Nov 2020
Blockchain is an emerging technology that has grown in popularity with innovators and solution architects over the past few years. With real-world use cases that range from the confidential sharing of medical data to supply chain monitoring, this platform offers any organization a secure system to store and retrieve transactional information.  At its core, blockchain is a database. It differs from traditional databases by the method it uses to store and retrieve information. As it records data in virtual blocks, [...]
CDN Security
03 Aug 2020
SDP, VPN, or Hybrid are three models organizations can leverage to strengthen their cybersecurity. As securing the perimeter of your network is a fundamental requirement for any organization, enterprises need to ensure they adopt the best possible approach. Not only do you have to ensure you protect your systems from unauthorized access, but you also need to provide users with the ability to work from anywhere, at any time. Although remote work is increasing, it is not a new [...]
Privacy
25 May 2020
Data broking is a big business in today's online digitally-driven world. As the world continues to embrace technology to improve efficiency, access knowledge, drive communication, and enhance collaboration, the production of vast quantities of data is either a direct or indirect collateral effect of any digital interaction. In 2017, the Economist stated that data is more valuable than oil. Although it may seem unusual to put a price tag on an intangible asset created by simple online interactions, the [...]
Encryption
13 Apr 2020
End-to-End Encryption (E2EE) ensures the confidentiality and privacy of the parties to a particular communication. Irrespective of the medium chosen, be it text, voice, or video, this technology prevents third-parties from accessing any interaction while it is in transit or at rest. As the vast majority of today's intercommunication occurs across the Internet, encrypting your information is vital. Users typically leverage a variety of third-party apps and services to interact with their friends, family, and colleagues. Due to the sensitive nature of most interpersonal communications, it is [...]
Blockchain CDN
31 Mar 2020
The Dark Web is a controversial topic that is shrouded in mystery for many regular Internet users. Portrayed in the media as a seedy underground virtual reality where cybercriminals roam free and peddle their illicit wares, this encrypted network has been a newsworthy subject since its rise to infamy during the last decade. Although the Dark Web may appear to be a prohibited playground hosting illegal products and services, one cannot ignore its use in the fight for online [...]
Encryption
02 Feb 2020
Securing your website is vital in today's ever-evolving threat landscape. New cyberattacks, unauthorized intrusions, and data breaches emerge daily, placing both your business and customers at risk. As your website is the public face of your enterprise, it presents the perfect target to motivated attackers. Finding the perfect balance between security and functionality is vital to the usability of your site. You need to ensure potential customers can access your website rapidly and efficiently. However, you also need to implement security measures to protect them, your data, [...]
Cyberwar
26 Jan 2020
Cyberwar is a genuine threat to every person, organization, and nation-state. In today's digitally driven society, every system that helps us navigate, participate and compete in the digital age relies on the availability and unhindered functionality of technology. Classical warfare doctrine, such as the treatise written by Sun Tzu, states that the supreme art of war is to subdue the enemy without fighting. The objectives stated by Sun Tzu have become a reality as warfare evolves in the digital [...]
Encryption
10 Nov 2019
Cache Poisoned Denial of Service is an attack vector that disables valid user access to online resources and websites. As caching plays a vital part in the delivery architecture of most web applications, attacks against this infrastructure component can have a significant impact on the availability of an online service. Implementing caching, whether it be on your origin server or by leveraging the services of a Content Delivery Network, is a proven strategy that enhances the end-user experience. By improving page-load speeds, not only [...]
CDN Security
28 Oct 2019
Securing and protecting your website is vital for every business, individual, or service that has an online presence. Even though you may believe your site holds nothing of value, every webserver is a prime target for hackers. Using automated scripts, criminals and syndicates scour the Internet looking for vulnerable websites they can compromise. Once they have managed to breach your platform’s security, they then leverage your service to host illegal sites, send spam, and distribute malware to unsuspecting victims. Implementing security measures to protect your website requires [...]