Posts

security-expert-blog-header

How to Be Your Own Security Expert

January is a great time to start a new habit. In fact, research…
aep (advanced endpoint protection)

What is AEP (Advanced Endpoint Protection)?

Although they were once considered reliable and accessible,…
common criteria cc eal

Breakdown of the Common Criteria (and How It Applies to WAFs)

The Common Criteria for Information Technology Security Evaluation,…
penta govware singapore in the background

Penta Security to Showcase Its Latest IoT Security Developments and Solutions at GovWare 2017

During Singapore’s International Cyber Week (SICW), Penta Security…
website security plugins limitations

The Limitations of Website Security Plugins

If you’re a website owner, you’re probably using a myriad…
detect and respond cybersecurity

The Flaws with Detect and Respond

There has been a lot of discussion around Detect and Respond…
10-cyber-security-lingo

Top 10 Cyber Security Lingo You Need to Know

“Jargon” is defined as a set of words that are used by…
gdpr data protection law in EU

Data Protection Laws and Cybersecurity: Mitigating the GDPR Challenge

It looks like data privacy has and will continue to be a…
ciso working at business from a window

Why More Companies Are Looking for a CISO

A growing number of web and data threats has companies scrambling…
web application threat trends by industry for 2016

Web Application Threat Trend (WATT) Report Released from 2016 by Penta Security Systems

Trends show that hacking attempts targeting web applications…