Why it’s Time to Adopt a Risk-Based Approach to AppSec

Author(s):

Vinugayathri Chinnasamy, Senior Content Writer, Indusface

Risk-based AppSec

Today, AppSec (Application Security) is not only about compliance with regulatory frameworks. In the face of newer threats, a growing attack surface, and the lack of AppSec talent, legacy WAF solutions and traditional security approaches constantly try to catch up but unsuccessfully. And this is where the risk-based approach to security comes in.  This article … Read more

4 Actions to Improve DDoS Protection

Author(s):

Vinugayathri Chinnasamy, Senior Content Writer, Indusface

DDoS Protection

Distributed Denial of Service (DDoS) attacks are increasing in the sheer volume and size of attacks and their impact, severity, and sophistication. Therefore, DDoS attack protection is also becoming more complex and challenging. Simply using a traditional Web Application Firewall (WAF) or increasing the server bandwidth will not protect you from a DDoS attack.  Even … Read more

The Importance of Cybersecurity and DDoS Protection in Finance

Author(s):

Marc Wilczek, COO, Link11

DDoS Protection & Financial Security

The financial services sector is one of the biggest industries at risk, particularly after the COVID-19 pandemic and the boosted digitalization of business and personal finances. Banking is no longer a brick-and-mortar business; banking is digital, it’s mobile – 24/7, around the globe, which provides cybercriminals with more attack surfaces. Lately, we have seen cybercriminals … Read more

Can VPNs Stop DDoS Attacks?

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

Can VPNs Stop DDoS Attacks?

The whole point of a website is to be up and running 24/7; however, cybercriminals can attack at any moment, forcing you offline. They can use Distributed Denial of Service (DDoS) attacks to interrupt your business and impact your revenue. In a DDoS attack, attackers send thousands of unwanted requests to the servers, preventing legitimate … Read more

The Importance of WAAP for Businesses Today

Author(s):

Vinugayathri Chinnasamy, Senior Content Writer, Indusface

The Importance of WAAP for Businesses Today

Web applications and APIs today form the core of an organization’s interface with its customers, partners, and other stakeholders. Given their growing public use and prevalence and the growing range of threats facing them, the protection of web applications and APIs has become imperative for every organization. What is WAAP?  Web Application and API Protection … Read more

How to Tell if Your Wireless Router Has Been Hacked

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

How to Tell if Your Wireless Router Has Been Hacked

Routers are hardware devices used by ISPs (Internet Service Providers) to connect their customers to their xDSL or cable internet network. Wi-Fi routers or wireless routers combine wireless access points, networking functions, and a router. In essence, routers connect local networks to the internet or other local networks; thus, wireless access points connect devices to … Read more

The Worst DDoS Attacks in Recent History and How to Protect Your Business from Them

Author(s):

John Black, Senior Content Writer, Globex IT Solutions

DDoS Attacks - WAF

There has been an alarming increase in DDoS (Distributed Denial of Service) attacks in the last year. The majority of businesses in various industries along with their different processes have no choice but to shift online to ensure business continuity. There was sudden transfer to remote operations and telecommuting, which logically meant more access to … Read more

What Bitcoin Needs to Become a True Global Currency

Author(s):

Frankie Wallace, ,

Bitcoin

The popularity of bitcoin is connected with being able to purchase things across the world without changing currency, as well as being able to stay anonymous and do business without interference from government agencies. Even though its popularity is growing rapidly, there are issues preventing the global adoption of bitcoin. Before cryptocurrencies can become a … Read more

(In)Famous Hacking Groups

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

The Different Hacking Groups Hacking Groups are a staple of cybersecurity culture. Since the 1995 release of the movie Hackers, there has been a very specific subset of cultural cliches we associate with all hacking groups. However, some hacking groups aren’t youthful, energetic teenagers or lone wolfs. In fact, some groups are state sponsored, and … Read more