Penta Security’s

Cyber Security Blog

Bringing you the trending topics and news of the IT-security industry.

A DDoS hacker

Who’s Behind DDoS Attacks and How Can You Protect Your Website?

DDoS attacks are increasing in intensity, frequency, and sophistication. So who’s behind DDoS attacks and why do they execute these attacks? What can you do to stop them? Despite all this innovating and evolving, DDoS attacks are still a blunt weapon deployed for one single basic purpose: to make target websites unavailable to users. There is […]

signature-less-detection-technology

The Benefits of Using Signature-less Detection Technology

Cloudbric takes pride in being different from its competitors. With over 19 years of information security experience, Cloudbric Business Edition (BE) utilizes a Web Application Firewall (WAF) based on Penta Security’s unique logic based hardware WAF called WAPPLES. Managing your enterprise’s security has never been easier, not to mention cost saving. Cloudbric BE is a […]

CMS

What Does ‘Website’ Mean to CMS Users?

The definition and concept of website will invariably differ depending on the demographic you’re questioning. Defined literally, a website is a connected group of pages on the internet that use unique addresses and routes on the network, which are based on internet protocols. But who can actually understand this kind of explanation? CMS has become the leading solution […]

how-to-protect-subdomains

Can I Also Protect My Subdomains With Cloudbric?

Cloudbric received a lot of questions about our web application security service, and in our mission to democratize cyber security, we try our best to make the information readily available. We post a lot of answers in our Help Center, but every week we will give a longer answer about one question. This week, a […]

Cloud based WAF

Using a Cloud-Based WAF as a Service for Better Web Security

Before the advent of the cloud-based WAF, Web Application Firewalls (WAF) usually came in the form of hardware. These WAF appliances were great for big businesses and enterprises. They provided flexibility, fast accessibility to the device and  did not depend on external connections for functionality. However, they also had a few disadvantages. Hardware WAFs were […]

sarbanes-oxley requires financial auditing and internal controls

The (Cyber Security) Fuss About Sarbanes-Oxley

In the cyber security news realm, there’s been a lot of talk these days regarding Sarbanes-Oxley. To give some formal background, the Sarbanes-Oxley Act of 2002 (sometimes referred to as SOX or Sarbox) was an act passed by Congress in 2002 to keep companies from participating in dubious financial activity. The Act requires companies to […]

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.