How to Secure IoT Devices – A Best Practices Guide
A recent Gartner IoT security primer revealed that at least 80% of organizations already use The Internet of Things (IoT) for business purposes. The paper also reported that 20% already…
What is Lateral Movement? Dissecting a Key Tactic In Sophisticated Cyber Attacks
Appearing in 25% of all attacks encountered by respondents of the 2022 VMware Global Incident Response Threat Report, lateral movement can no longer be ignored. Unless you understand what it…
An Introductory Guide to Data Center Security For Customers
To be effective in securing your IT infrastructure, you need to be familiar with the various aspects of security in and around that infrastructure. So, if you’re hosting your infrastructure…
How to Spot a Phishing Email
A few hours ago, I received an email, allegedly from TrustWallet, requesting my immediate action on an “urgent matter”. Apparently, I had to undergo their Know Your Customer (KYC) process.…
VPN vs Firewall – Do You Need Both?
VPNs and firewalls are two of the most basic cybersecurity tools. Many organizations have at least one of these two. That said, is there any scenario when you would need…
Hello (Cybersecurity) World: My Journey towards Becoming a Security Analyst
Join me as I embark on a new career journey as an almost-50 year old woman—that of becoming a cybersecurity analyst.
Types of VPNs – An Introductory Guide
When you’re still learning about VPNs, whether for educational or buying purposes, it’s important to bear in mind that there are different types of VPNs. Some types of VPNs are…
Characteristics of Cloud Computing
In the last couple of decades, industries have been steadily migrating from traditional on-premises IT to cloud infrastructures. This gradual shift accelerated during the COVID-19 pandemic, as businesses sought secure,…
An Introductory Guide To The Different Types of Data Centers
There are different types of data centers. There are data centers that require minimal or even zero capital. There are those that give you full control over your IT infrastructure.…
An Introductory Guide to IaaS
Anyone who has ever tried provisioning a physical server and a virtual server will tell you how significantly easier the latter is compared to the former. And I’m just talking…