Pedo mellon a minno, speak friend and enter
How to create strong passwords and why that is so important! Much more on the blog, including if Moria’s door was well protected
Checklist: 7 Questions to ask potential hosting providers
When selecting a reliable, trusted PCI DSS cloud-hosting provider it is critical to understand and investigate the seven main areas outlined below so you can partner with confidence.
What kinds of companies can benefit from using a WAF?
In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. This is where a WAF comes in…
5 tips for writing an Information Security Policy
5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind
How to implement a Log management system
Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation
Blockchain and GDPR: When Opportunities and Challenges Meet
How the Blockchain will be able to support and respect the rules on the protection of personal data introduced by the GDPR.
How can you protect yourself against (D)DoS attacks?
The reasons vary as to why someone performs an attack, anything from disruption of a competitor’s business to foreign influence
Questions and answers about WAF
WAF is short for Web Application Firewall, and is a firewall for web applications. It is a way to protect network traffic