Blog

Blog

How to Answer Key Capacity Planning Strategy Questions

Anyone who works for a large organization knows that July isn’t just a time for fireworks and BBQs. It’s also when you plan your budget for the next fiscal year. If you work in IT, you know you’re always expected to have an answer for everything. But when it comes to planning your budget, there are really only two questions that need to be asked. Do you have enough resources on hand for the...
Vulnerability Research

BlueKeep Vulnerability – Patch Now, Patch Again

With the May 2019 Patch Tuesday release from Microsoft, it was revealed a number of older Microsoft operating systems are vulnerable to a condition known as BlueKeep (CVE-2019-0708). BlueKeep is a Remote Code Execution (RCE) flaw in Remote Desktop Services (RDS)/Remote Desktop Protocol (RDP) allowing code to run with system level access and is potentially “wormable” making it possible for an...
Blog

MSSPs Need the Industry to Evolve to Offer Multi-Tenant Vulnerability Management Solutions for Today’s Dynamic Environments

According to the Verizon Data Breach Investigations Report, published in November 2018, the #1 cause of a breach continues to be vulnerable systems left exposed and unpatched. Preventing the exploitation of vulnerabilities when using an effective solution is one of the few countermeasures that can pro-actively protect your infrastructure before an attack has even started as opposed to relying on...
Blog

Nevada Beats California With New Privacy Law

Nevada's new law, which will require website operators to honor opt-out procedures, goes into effect on October 1, three months before the CCPA's compliance deadline, January 1, 2020.
Blog

The True Cost of Workload-Related Outages

Underestimating the consequences of downtime can be hugely detrimental to your productivity. Accurately calculating those costs won’t just prevent disasters, but also help you effectively manage your capacity planning efforts.
Blog

What is Capacity Planning?

window._wq = window._wq || []; _wq.push({ id: "hee163tx2g", options: { preload: "auto" } }); What is Capacity Planning? IT capacity planning is a process used to manage IT service delivery. Business services depend on IT resources in most organizations. Retail organizations need IT to make sure their POS system stays up and running – even on days...
Blog

Security Alphabet Soup

There is no shortage of unique terms and acronyms within the cybersecurity industry. In many ways, security has a language of its own. This guide lists more than 40 of the most common cybersecurity acronyms, serving as a resource for beginners and a reference guide for those with more experience. Terms are listed in alphabetical order for ease-of-use.
Blog

What Are SQL Injection Attacks?

There are few vulnerabilities that strike fear into the hearts of security professionals more than a SQL injection attack. Why? Because unlike most vulnerabilities that can be readily detected, while a SQL injection attacker can hide within a vulnerable application until someone accesses and exploits it.What is a SQL Injection Attack?A SQL injection attack is basically an act by an attacker of...
Blog

Zeus Trojan - What It Is & How to Prevent it

What is Zeus Trojan?Today, there are more people online than ever before, with almost 300 million browsing the Internet in the United States alone.And while that offers numerous advantages, there are also risks – hackers and cybercriminals are always looking for ways to access people’s personal information and steal their money using malware and trojans.One of the most malicious and dangerous...
Blog

What is Cybersecurity & What Does it Really Mean?

How Do We Define “Cybersecurity” in Modern TimesCybersecurity has steadily worked its way from being an Information Technology (IT) problem to being a boardroom priority. But what is ‘Cybersecurity’ at its core? The cybersecurity definition encompasses the technologies, practices, processes and procedures intended to protect networks, endpoints, programs, applications, and data from attackers...
Blog

Top 50 InfoSec Networking Groups to Join

Looking to stay ahead of the curve on all things infosec? We've gathered a list of 50 valuable associations, LinkedIn networking groups, and meetups for security professionals.
Blog

IoT Device Testing Made Possible With BeStorm X

This article was originally published on TechTarget on April 22, 2019.In an international collaboration, U.S.-based Beyond Security and Japan-based Ubiquitous AI Corporation developed and launched BeStorm X, a vulnerability verification tool designed specifically to test IoT devices. The vendors claim the tool is an amalgamation of Beyond Security's BeStorm version 7.6.8 and UAC's IoT technologies...
Blog

The Pros & Cons of Network Diagrams

Do you know what devices are connected to your network? A network diagram can help you get a better sense of what's happening on your network. Check out the infographic to learn the pros and cons of network diagrams. s Not Loading? Check out the Text Version Keeping your network up and running can seem like an uphill battle. Especially without...