Penta Security’s

Cybersecurity Blogs

Bringing you the trending topics and news of the IT security industry.

common criteria cc eal

Breakdown of the Common Criteria (and How It Applies to WAFs)

The Common Criteria for Information Technology Security Evaluation,…
trickbot malware

TrickBot: The Picky Malware

It’s often assumed that malware is created to spread to…
biometrics in action

Biometrics in Action: Where Are Popular Forms of Authentication Being Used?

We’ve discussed the differences between two-factor authentication…
website security plugins limitations

The Limitations of Website Security Plugins

If you’re a website owner, you’re probably using a myriad…
iot security importance for all

Why You Should Care About IoT Security

You might not be one of the two-thirds of Americans currently…
detect and respond cybersecurity

The Flaws with Detect and Respond

There has been a lot of discussion around Detect & Respond…
Medical Devices With Exposed Vulnerabilities

5 Medical Devices with Exposed Vulnerabilities

The medical field has changed for the better, with technology…

Top 10 Cyber Security Lingo You Need to Know

“Jargon” is defined as a set of words that are used by…
db database encryption

Debunking 5 DB Encryption Misconceptions

Businesses handle an enormous amount of data. All of this…

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.