Penta Security’s

Cyber Security Blog

Bringing you the trending topics and news of the IT-security industry.

open-sign-1309682_1280 (1) (1) (1)

PCI DSS and the Road to Compliance

When you’re in the world of cyber security and researching new products, there’s no doubt that you’ll run into a plethora of acronyms. With the large amounts of advanced technology and the technical terms there are, it’s easier to shorten them to save some time and space. However, sometimes all the terminology begins to run […]

Cloudbric as a one-stop wall of security

Why You Need a Firewall

Your Website is Published. Is it Good to Go?   According to the Netcraft January 2015 web server survey, there are over 876 million websites all around the world. Among them, however, 30,000 websites are hacked each day and the majority of these websites are legitimate small businesses that are irrelevant to cyber criminals. Why is […]

A DDoS hacker

Who’s Behind DDoS Attacks and How Can You Protect Your Website?

DDoS attacks are increasing in intensity, frequency, and sophistication. So who’s behind DDoS attacks and why do they execute these attacks? What can you do to stop them? Despite all this innovating and evolving, DDoS attacks are still a blunt weapon deployed for one single basic purpose: to make target websites unavailable to users. There is […]

signature-less-detection-technology

The Benefits of Using Signature-less Detection Technology

Cloudbric takes pride in being different from its competitors. With over 19 years of information security experience, Cloudbric Business Edition (BE) utilizes a Web Application Firewall (WAF) based on Penta Security’s unique logic based hardware WAF called WAPPLES. Managing your enterprise’s security has never been easier, not to mention cost saving. Cloudbric BE is a […]

CMS

What Does ‘Website’ Mean to CMS Users?

The definition and concept of website will invariably differ depending on the demographic you’re questioning. Defined literally, a website is a connected group of pages on the internet that use unique addresses and routes on the network, which are based on internet protocols. But who can actually understand this kind of explanation? CMS has become the leading solution […]

how-to-protect-subdomains

Can I Also Protect My Subdomains With Cloudbric?

Cloudbric received a lot of questions about our web application security service, and in our mission to democratize cyber security, we try our best to make the information readily available. We post a lot of answers in our Help Center, but every week we will give a longer answer about one question. This week, a […]

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.