Posts

Computing

Is Your Data on the Cloud Secure?

A Thorough Analysis of Risks and Security Measures  Cloud…
ZERO TRUST

'Zero Trust', the 4 Concrete How-Tos

 ‘Zero Trust’ is quite the thing in the IT world.…
six personalities and types of hackers online kids older white hat and black hat

The 6 Types of Hackers You May Come Across Online

 These days it’s easy to look at the mountain of cyber…
Cloud based WAF

Using a Cloud-Based WAF as a Service for Better Web Security

Before the advent of the cloud-based WAF, Web Application Firewalls…
car security using gps or navigation

The Smart Car Trend (Part 2): Car Security?

In part 1 of the series, we talked about how smart cars are trending,…
Boy Programming On Computer With Multiple Monitors And Laptop On Desk

7 Ways to Expose Your Website to Hackers

So you want to serve up your website for any hacker to break…
employee using laptop and coding injection

Web Security: Why Does It Matter?

Once upon a time, to access the web we had to have access to…
clouds

Cloud Trends...or Cloud Threats?

"Cloud" is a term that's thrown around quite often in the IT…
profile

Web Application Firewalls – Essential For All Websites

As we enter the dawn of a web generation, there is an awful lot…
profile

Penta Security Speaker Featured at ISEC 2015

Cloud Security, What's the Current Status? Korea's 9th Annual…