Category Archives: Web Security

Privacy
25 May 2020
Data broking is a big business in today's online digitally-driven world. As the world continues to embrace technology to improve efficiency, access knowledge, drive communication, and enhance collaboration, the production of vast quantities of data is either a direct or indirect collateral effect of any digital interaction. In 2017, the Economist stated that data is more valuable than oil. Although it may seem unusual to put a price tag on an intangible asset created by simple online interactions, the [...]
Encryption
13 Apr 2020
End-to-End Encryption (E2EE) ensures the confidentiality and privacy of the parties to a particular communication. Irrespective of the medium chosen, be it text, voice, or video, this technology prevents third-parties from accessing any interaction while it is in transit or at rest. As the vast majority of today's intercommunication occurs across the Internet, encrypting your information is vital. Users typically leverage a variety of third-party apps and services to interact with their friends, family, and colleagues. Due to the sensitive nature of most interpersonal communications, it is [...]
Dark Web
31 Mar 2020
The Dark Web is a controversial topic that is shrouded in mystery for many regular Internet users. Portrayed in the media as a seedy underground virtual reality where cybercriminals roam free and peddle their illicit wares, this encrypted network has been a newsworthy subject since its rise to infamy during the last decade. Although the Dark Web may appear to be a prohibited playground hosting illegal products and services, one cannot ignore its use in the fight for online [...]
Encryption
02 Feb 2020
Securing your website is vital in today's ever-evolving threat landscape. New cyberattacks, unauthorized intrusions, and data breaches emerge daily, placing both your business and customers at risk. As your website is the public face of your enterprise, it presents the perfect target to motivated attackers. Finding the perfect balance between security and functionality is vital to the usability of your site. You need to ensure potential customers can access your website rapidly and efficiently. However, you also need to implement security measures to protect them, your data, [...]
Cyberwar
26 Jan 2020
Cyberwar is a genuine threat to every person, organization, and nation-state. In today's digitally driven society, every system that helps us navigate, participate and compete in the digital age relies on the availability and unhindered functionality of technology. Classical warfare doctrine, such as the treatise written by Sun Tzu, states that the supreme art of war is to subdue the enemy without fighting. The objectives stated by Sun Tzu have become a reality as warfare evolves in the digital [...]
Encryption
10 Nov 2019
Cache Poisoned Denial of Service is an attack vector that disables valid user access to online resources and websites. As caching plays a vital part in the delivery architecture of most web applications, attacks against this infrastructure component can have a significant impact on the availability of an online service. Implementing caching, whether it be on your origin server or by leveraging the services of a Content Delivery Network, is a proven strategy that enhances the end-user experience. By improving page-load speeds, not only [...]
CDN Security
28 Oct 2019
Securing and protecting your website is vital for every business, individual, or service that has an online presence. Even though you may believe your site holds nothing of value, every webserver is a prime target for hackers. Using automated scripts, criminals and syndicates scour the Internet looking for vulnerable websites they can compromise. Once they have managed to breach your platform’s security, they then leverage your service to host illegal sites, send spam, and distribute malware to unsuspecting victims. Implementing security measures to protect your website requires [...]
Cyber Security
24 Jun 2019
Secure edge computing is vital in dispersed networking environments. With 5G networks set to revolutionize and accelerate the deployment of IoT solutions, the adoption of edge computing is set to increase over the next few years. This technology paradigm shift, where some processing will move from a centralized computing architecture to a decentralized model, requires organizations to rethink their security strategy. Unlike cloud computing, where enterprises can focus their efforts on securing a centralized service, the edge poses several challenges due to the dispersed nature of this [...]
CDN Security
25 Mar 2019
Securing access to your CDN content is a requirement every website operator may need to consider at some point. Depending on the nature of the material you provide, you may not want to share it with unauthorized parties. In other instances, you might need to protect your digital rights, or there may be some other business case that requires you to limit or restrict access to the information you store on a Content Delivery Network (CDN). There are various ways [...]
CDN Security
04 Feb 2019
Threats that could compromise the security of your cloud environment consist of both universal and cloud-specific risks. If you examine the Cloud Security Alliance report on the 12 biggest threats to cloud computing, it includes elements such as system vulnerabilities and malicious insiders. Security issues such as these two examples have been prevalent in non-cloud computing environments for decades. Although some stated cloud security issues may be universal, you still need to follow industry best practice to ensure your environment is secure. Even though the Top 12 [...]