US shares tips to block hackers behind recent telecom breaches
CISA released guidance today to help network defenders harden their systems against attacks coordinated by the Salt Typhoon Chinese threat group CISA released guidance today to help network defenders harden…
What is OAuth?
OAuth, short for Open Authorization, is an open standard protocol used for secure authorization. It allows users to grant third-party applications limited access to their resources without sharing their credentials,…
What is an Endpoint?
What is an endpoint in networking? An endpoint is any device that connects to a computer network. When Bob and Alice talk on the phone, their connection extends from one…
What is Defense In Depth?
“Defense in depth” (DiD) is a cyber security strategy that uses multiple security products and practices to safeguard an organization’s network, web properties, and resources. It is sometimes used interchangeably…
What is an insider threat?
An insider threat is a security risk posed by an employee, former employee, contractor, or vendor. Insider threats can result in fines, reputational damage, and loss of intellectual property. What…
What is a RSA Tolken Keyfob?
An RSA token keyfob, often called an RSA SecurID token, is a hardware device used for two-factor authentication (2FA). Here’s how it works: The RSA token keyfob is a small,…
What is threat intelligence in cyber security?
Threat intelligence is information about the potential attacks an organization may face and how to detect and stop those attacks. Law enforcement sometimes distributes “Wanted” posters with information about suspects;…
What are indicators of compromise (IoC)?
Indicators of compromise (IoC) are evidence left behind by an attacker or malicious software that can be used to identify a security incident. What are indicators of compromise (IoC)? Indicators…
What is data exfiltration?
Unauthorized data transfer, or data exfiltration, is a significant threat to organizations. Learn how data exfiltration happens and essential strategies to prevent it. What is data exfiltration? Data exfiltration is…
What is API security?
Much of the modern Internet relies on APIs to function. API security is the process of protecting APIs from attacks and data breaches. What is API security? An application programming…