Insider Threats: Dealing with the Enemy Inside

For companies, threats come from two sources—outside the organization and inside (reads: disgruntled, unethical employees). Insider threats can be very difficult to handle and the number of annual incidents is on the rise. The insider threat can come in several forms: Employees who steal intellectual…

Read more

Server Side Request Forgery (SSRF)

A Server Side Request Forgery (SSRF) attack gives an attacker the ability to use your web application to send requests to other applications running on the same machine, or to other servers which can be on the same or on a remote network. Since the…

Read more

IT Security Includes Cyber Attack Response

Preventing cyber attacks is a dominant topic for IT security. It is the first layer of defense. The more attacks prevented the better – no question about it.  However, does great prevention guarantee there will no successful cyber attacks?  Of course not. Good Security is…

Read more