Modern Techniques to Prevent Malware instead of Detecting It
Google lists 12,400,000 results to the search of "malware detection tools." Is malware detection a silver bullet, or is there a smarter method to prevent malware attacks? We believe there is one.
Are ransom DDoS attacks coming back?
The emerging threat of ransom DDoS attacks is knocking on the doors, or rather the TCP ports, giving us another example of how cybercriminals are adapting to their victims’ IT infrastructure and cyber defense.
Why is Zero Trust more important than ever before?
In the age of ransomware and supply chain attacks, how can organizations defend themselves? One of the possible answers is Zero Trust.
Zero Trust: Is it anything new?
What are the theories and practices and why they are so important? Let’s take a look.
The Shadow of Mass Endpoint Surveillance – Is the Network Already Secure?
Government agencies and Big Tech companies want to automatically scan mobile devices to fight against terrorism or child sexual abuse materials. Should we let them do that?
What can we learn from the Coursera API-story?
A number of security vulnerabilities have been found and disclosed in the Coursera online learning platform. Csaba Krasznay summarizes the key learning points of the story.
What’s new in Balasys Proxedo Network Security 1.0.5
Key new features that have been added to the product since the 1.0. release
7 tips to prevent breaches like the SolarWinds hack
Let's learn from the SolarWinds hack!
Balasys TOP10 IT Security Predictions 2021-2023
In the past year, COVID-19 has had a greater impact on work habits and security environments than any other health emergency in history.
Complement web application firewalls and API management
A Proxedo API Security use case
Zorp GPL – an open source, cloud-based firewall for Kubernetes
The benefits of Zorp GPL when used as an ingress controller in Kubernetes
Why do you need API security?
Major concerns around the security of API-traffic and introduction of a potential solution.