Entries by Esther Jeohn

PCI DSS and the Road to Compliance

When you’re in the world of cyber security and researching new products, there’s no doubt that you’ll run into a plethora of acronyms. With the large amounts of advanced technology and the technical terms there are, it’s easier to shorten them to save some time and space. However, sometimes all the terminology begins to run […]

The Benefits of Using Signature-less Detection Technology

Cloudbric takes pride in being different from its competitors. With over 19 years of information security experience, Cloudbric Business Edition (BE) utilizes a Web Application Firewall (WAF) based on Penta Security’s unique logic based hardware WAF called WAPPLES. Managing your enterprise’s security has never been easier, not to mention cost saving. Cloudbric BE is a […]

What Does ‘Website’ Mean to CMS Users?

The definition and concept of website will invariably differ depending on the demographic you’re questioning. Defined literally, a website is a connected group of pages on the internet that use unique addresses and routes on the network, which are based on internet protocols. But who can actually understand this kind of explanation? CMS has become the leading solution […]

Can I Also Protect My Subdomains With Cloudbric?

Cloudbric received a lot of questions about our web application security service, and in our mission to democratize cyber security, we try our best to make the information readily available. We post a lot of answers in our Help Center, but every week we will give a longer answer about one question. This week, a […]

Using a Cloud-Based WAF as a Service for Better Web Security

Before the advent of the cloud-based WAF, Web Application Firewalls (WAF) usually came in the form of hardware. These WAF appliances were great for big businesses and enterprises. They provided flexibility, fast accessibility to the device and  did not depend on external connections for functionality. However, they also had a few disadvantages. Hardware WAFs were […]

The (Cyber Security) Fuss About Sarbanes-Oxley

In the cyber security news realm, there’s been a lot of talk these days regarding Sarbanes-Oxley. To give some formal background, the Sarbanes-Oxley Act of 2002 (sometimes referred to as SOX or Sarbox) was an act passed by Congress in 2002 to keep companies from participating in dubious financial activity. The Act requires companies to […]

Cited by Gartner in 2016 Hype Cycle for Data Security

Listed as sample vendors for FPE and Database Encryption, Penta Security receives attention for its developments Seoul, Korea: Penta Security Systems Inc., a leading Web and Data security provider in the Asian-Pacific region, announced that it has been listed as a sample vendor for two technologies, Format Preserving Encryption (FPE) and Database Encryption, in the […]

Top 3 Web Security Misunderstandings by Small Businesses

Web security seems to be the buzzword in the news the past couple of years with stories of legendary hacks hitting companies like Target, Home Depot, J.P. Morgan, and Sony—just to name a few. However, because we always hear about these hacks happening to big and established companies, we often  think that these kinds of […]