Home > Support > Blog
The WPA2 Security Flaw: What You Should Know

The WPA2 Security Flaw: What You Should Know

A security researcher has reported a serious vulnerability in the Wi-Fi Protected Access II (WPA2) security protocol that could allow hackers within range of a wireless network to intercept data, or even inject malicious content or malware in certain cases. The flaw was discovered by Mathy Vanhoef of the Imec-DistriNet Research Group of Belgian university KU Leuven. Vanhoef executed a successful attack as a proof of concept.

Tuesday, October 31, 2017/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (137)/Comments (0)/
Categories: Security Services
5 Ways SD-WAN May Affect PCI Compliance

5 Ways SD-WAN May Affect PCI Compliance

Software-defined WAN (SD-WAN) is increasingly popular among organizations struggling with costly and inefficient WAN architectures. Leveraging software-defined techniques to virtualize the WAN and prioritize traffic in real time, SD-WAN enables organizations to reduce their reliance on expensive MPLS links while gaining greater performance and flexibility. SD-WAN also makes it easy to set up secure site-to-site connections between headquarters and remote locations.

Monday, September 25, 2017/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (275)/Comments (0)/
Categories: Security Services
NIST Drafts an Update to Its Cybersecurity Framework

NIST Drafts an Update to Its Cybersecurity Framework

The term “perfect storm” refers to a confluence of events that makes a bad situation dramatically worse. It succinctly sums up the cybersecurity challenges organizations are facing today.

Tuesday, June 27, 2017/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (399)/Comments (0)/
Categories: Security Services
‘Aftershock’ Attacks Could Prove Far More Devastating than WannaCry

‘Aftershock’ Attacks Could Prove Far More Devastating than WannaCry

The WannaCry ransomware attack rocked the IT world on May 12, striking hundreds of thousands of computers in more than 150 countries within days. The malware exploited known vulnerabilities in Windows operating systems to spread without user interaction. Many organizations around the globe were affected as the malware raced through their networks with astonishing speed.

Thursday, May 25, 2017/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (820)/Comments (0)/
Categories: Security Services
Tags:
New Report: IoT Devices Used to Mount Massive-Scale Attacks

New Report: IoT Devices Used to Mount Massive-Scale Attacks

Hackers are using compromised Internet of Things (IoT) devices to attack ecommerce and other web sites, according to a report published Oct. 12 by the Akamai Technologies Threat Research team. The researchers noted a recent spate of attacks in which hackers attempted to gain access to the sites using login and password combinations from the recent Yahoo! security breach, in which half a billion accounts were stolen. Because many people reuse their passwords, hackers often try stolen credentials in other sites to see if they work.

Monday, November 21, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (853)/Comments (0)/
Categories: Security Services
RSS
123
paykasa bozum
istanbul evden eve nakliyat
porno izle
full porn movies
instagram begeni
mobilepornxtube mobile18porn mobilefuckporn mobilexxxsexporn xnxxpornvideos.xyz/a> freexnxxporn.xyz
sex izle
kusadasi escort
beylikduzu escort escort istanbul escort porno izle sex hikayeleri
kusadasi escort
free porn videos