An in-depth HTTP Strict Transport Security Tutorial

Credit to Author: Michael Langford| Date: Wed, 11 Jan 2023 00:00:00 +0000

HSTS is an Internet standard and policy that tells the browser to only interact with a website using a secure HTTPS connection. Check out this article to learn how to leverage the security of your website and customers’ data and the security benefits you’ll gain from doing so.

Read more

When and How to Use AWS Graviton

Credit to Author: Michael Langford| Date: Thu, 22 Dec 2022 00:00:00 +0000

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Read more

Protect Your Network with Zero-Day Threat Protection

Credit to Author: Michael Langford| Date: Fri, 09 Dec 2022 00:00:00 +0000

Explore the world of zero-day threats and gain valuable insight into the importance of proactive detection and remediation. Learn how Trend Micro™ Research mitigates risk by providing global cybersecurity intelligence to continuously discover the ever-changing attack surface, understand and prioritize vulnerabilities, detect and rapidly respond to threats, and apply the right security at the right time.

Read more

Why Chaos Engineering is a Good Stress Test Strategy

Credit to Author: Michael Langford| Date: Fri, 02 Dec 2022 00:00:00 +0000

Learn about chaos engineering, a method of resilience testing that intentionally introduces “chaos” into a system to discover vulnerabilities and weaknesses that can be exploited by attackers.

Read more

Will Cloud-Native Network Security Oust Firewalls?

Credit to Author: Duane Seon| Date: Wed, 16 Nov 2022 00:00:00 +0000

Security threats have already begun to outpace cloud firewalls. It’s a fact. But organizations exploring new cloud-native solution find themselves more prepared to stay resilient. Find out how cloud-native network security’s features and benefits are making this possible.

Read more

Are Containers Affected by OpenSSL Vulnerabilities?

Credit to Author: Raphael Bottino| Date: Mon, 07 Nov 2022 00:00:00 +0000

Find out if your container-based applications are vulnerable to the new OpenSSL vulnerabilities and the recommendations to help ensure you are protected.

Read more

Improve Post-Quantum Cryptography Security with CSPM

Credit to Author: Michael Langford| Date: Thu, 03 Nov 2022 00:00:00 +0000

Gain valuable insight into the emerging world of post-quantum computing. Understand the threats attackers with access to quantum computers pose. Learn how harnessing the power of cloud security posture management (CSPM) can mitigate these looming dangers.

Read more