How to apply security policies for remote workforces
Identity and access management (IAM) solutions protect company data even when employees do not enter the office. What are the security challenges of a remote workforce? In an on-premise working…
Cyber Security with a flare
Identity and access management (IAM) solutions protect company data even when employees do not enter the office. What are the security challenges of a remote workforce? In an on-premise working…
Border Gateway Protocol (BGP) is the routing protocol for the Internet. Like the post office processing mail, BGP picks the most efficient routes for delivering Internet traffic. What is BGP?…
DNS lets users connect to websites using domain names instead of IP addresses. Learn more about how DNS works. What is DNS? The Domain Name System (DNS) is the phonebook…
Four different types of DNS servers have to work in harmony to deliver a single webpage. What are the different types of DNS servers? All DNS servers fall into four…
A DNS root server is the first stop in a DNS lookup. What is a DNS root server? The administration of the Domain Name System (DNS) is structured in a…
In DNS lookups, which match domain names to machine-readable IP addresses, the journey up the DNS tree can either be made by DNS. What is recursive DNS? A recursive DNS…
Simple but effective “cheat sheet” on internet/networking protocols, simple examples of how they work, and use case scenarios for how a protocol would typically be used.
1Password, a popular password management platform used by over 100,000 businesses, suffered a security incident after hackers gained access to its Okta ID management tenant. “We detected suspicious activity on…
A volumetric DDoS attack that takes advantage of a vulnerability in the NTP protocol, flooding a server with UDP traffic. What is a NTP amplification attack? An NTP amplification attack…