THIS IS HOW TO PREPARE FOR A CYBER ATTACK

Cybersecurity is only in the spotlight when it fails. After high-profile, large-scale data breaches, it takes a beating. But cybersecurity provides critical layers of infrastructure in our modern, cyber-dependent society. Rehearsing for potential failures is always worthwhile. Executives tend...

Securing your APIs

Covering your APIs Web APIs are not exactly a new technology. You can find an API for almost any service offered online. The reason for the popularity is not surprising, APIs easily and efficiently facilitate integration between applications. This...

Kodi Users on Apple TV at Risk of Getting Hacked

Kodi, the free media player, is pretty popular among those who use Apple TV and it has always been an open-ended approach to streaming. It appears that the software is vulnerable and those who installed it are at risk...

Distributed-Denial-Of-Service Attacks And DNS

Distributed-denial-of-service (DDoS) attacks have become the scourge of the internet. DDoS attacks use compromised internet devices to generate enormous volumes of data and direct that data at a particular target such as a web server or router. That target...