Information Security
Would you bring your own device to work, given a choice? We've got some surprising facts that show the impact of BYOD in the workplace.
By Craig McCart in Information Security on November 1, 2022
DDoS attacks are on the rise, but hackers are also adapting their strategies to counteract growing mitigation techniques. Here's a review of the latest stats and trends highlighting DDoS attacks in 2018-2024.
By Sam Cook in Information Security on January 8, 2024
Cyber security in the United States has become an important topic as digital crime continues to ravage throughout the country. Find out about the latest statistics on US cyber security and cyber crime.
By Ray Walsh in Information Security on January 10, 2024
Like most injection attacks, LDAP injection can be nasty. This post looks at how these LDAP attacks are pulled off and how to avoid them.
By Marc Dahan in Information Security on June 19, 2022
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
By Josh Lake in Information Security on September 5, 2023
Server-side include (SSI) injection attacks aren't the most common online attack, but they can have disasterous consequences. This post looks at what SSI injection attacks are and provides tips on defending against them.
By Marc Dahan in Information Security on November 16, 2023
The CIA triad are three critical attributes for data security; confidentiality, integrity and availability.
By Josh Lake in Information Security on November 1, 2023
Single sign-on can make life easier for users and help to boost an organization's overall security. We reveal the pros and cons of single sign-on and whether you should use it.
By Josh Lake in Information Security on August 1, 2023
Page 7 of 48