The Purple Team: What It Is and How Your Organization Can Benefit from Having One
Regardless of the size and the industry of an organization, one of the most effective ways to discover infrastructure vulnerabilities and thwart possible cyber threats is to rely on the expertise of both red teams and blue teams.
Ransomware Attacks: What They Are, Common Types and How to Protect Yourself
It’s no wonder ransomware is one of the most feared types of cybercrime out there. The idea of being denied access to your system or personal files and having them held under ransom by a malicious attacker is one of the worst scenarios most of us can imagine.
What’s New at SecurityTrails: New Domain SSL, IP WHOIS and IP User Agent API Endpoints
Today, we are sharing the release of new API endpoints to fetch SSL certificate information for hostnames, IP WHOIS contacts and abuse information as well as User Agent information for IP addresses. In addition to the new API endpoints we have also updated our Console. Check out the full Changelog which is updated whenever we roll out new changes.
Security Through Obscurity
When you work as a system administrator, one of your main tasks is to keep your systems secure, and that includes applying system package updates, kernel patching, disabling unnecessary services, installing IDs and firewalls, and many other things.
Mobile Security 101: Common Threats and How to Protect Yourself Against Them
Even with an estimated 5 billion people currently possessing a mobile device, half of them being smartphones, the use of mobile technology is still growing rapidly throughout the entire world.
Breaking Cybersecurity Myths
We’re now at a point where cybersecurity is considered an integral part of any business, no matter how big or small. You’d be hard-pressed to find any organization that doesn’t have at least some form of cybersecurity procedures and practices in its business model, and for good reason.
What is Data Center Security? Top 5 Best Practices
Cloud computing and technology have truly revolutionized the way we collect, process and store data. Organizations are increasingly moving their entire infrastructure to the cloud, storing their information in safe, encrypted data centers.
Security Theater: Are You Feeling Secure or Actually Being Secure?
The increase and intricacy of cyber threats show no sign of slowing. Headlines highlight new data breaches almost every day, proving that the need for cybersecurity has never been more apparent than it is right now.
List of All Cybersecurity Conferences to Attend in 2020
The coronavirus pandemic is significantly changing our daily routines and how we live our lives. Consequently, it has led to many events and, with that, industry conferences we were all so excited to attend, to be cancelled, postponed or rescheduled. This is why we have updated our list of the best cybersecurity conferences in 2020 to reflect whether the events will take place, have been postponed or moved online. Additionally, our spreadsheet has also been updated with details about whether, and when, the events will take place. You can download the updated list here. Conferences are an important part of any industry: they allow you to meet with your peers in a less formal environment, expand your professional network and stay on top of all the latest trends and concepts in your industry.
Building and Nurturing Company Culture with a Remote Team
Remote work is on the rise. More and more companies are ditching the idea of a physical office in favor of a fully remote team, especially in cybersecurity and IT in general. But despite the many benefits of working from home and creating your own style of work-life balance, we sometimes forget about the various challenges it brings.