Security

data security controls data protection

Data Security Controls: Primary Objective

Strong information security management calls for the understanding of critical principles and concepts such as data classification, change management/control, and protection mechanisms. Nonetheless, such terminologies might be overwhelming at the beginning, causing most enterprises to blindly adhere to compliance requirements

Data Security Controls: Primary Objective Read More »

insider threat cybersecurity

Insider Threats: How Can Enterprises Better Protect against this Growing Danger?

According to research from CA Technologies, over half of cybersecurity professionals, or 53 percent, have confirmed an insider attack against their own organization in the past 12 months. These insider threats have had disastrous, sometimes even tragic results, for governments

Insider Threats: How Can Enterprises Better Protect against this Growing Danger? Read More »

cybersecurity transparency threat intelligence

Greater Transparency Leads to Better Cybersecurity

The threat landscape is constantly evolving, and organizations of all sizes are essentially under siege. Effective cybersecurity is essential but evaluating and selecting cybersecurity solutions is challenging for companies—especially when it comes to trying to understand claims made by vendors

Greater Transparency Leads to Better Cybersecurity Read More »

DNS hijacking cybersecurity

PayPal, Netflix, Gmail, and Uber Users among Targets in New Wave of DNS Hijacking Attacks

Since March 29, 2019, Ixia’s Application and Threat Intelligence (ATI) center has been tracking the latest malicious campaign against consumer-grade routers. Today, April 5th, we captured a new wave of attacks that use a different DNS server. The purpose of

PayPal, Netflix, Gmail, and Uber Users among Targets in New Wave of DNS Hijacking Attacks Read More »

Scroll to Top