Category : InfoSecIsland

Security / InfoSecIsland - 2 weeks ago

The 3 Must Knows of Sandboxing

Sandboxes have been touted as a high-ranking method to prevent a cyber-attack on organizations because they allow you to test everything before it can affect your production environment. But does that come with a cost and are they as effective as...

Security / InfoSecIsland - 3 weeks ago

Infrastructure Under Attack

What makes a DDoS attack different from an everyday data breach? The answer is embedded in the term: denial of service. The motive of a DDoS attack is to prevent the delivery of online services that people depend on. Financial institutions, gaming...

Security / InfoSecIsland - 3 weeks ago

How to Prevent Cloud Configuration Errors

The advent of cloud computing has dramatically altered the technology structure of today’s companies &- making it much easier and faster to deploy resources as needed. In the traditional model, application developers had to wait for IT t...

Security / InfoSecIsland - 1 month ago

SOC Automation: Good or Evil?

Many security operations centers (SOCs) face the same recurring problem — too many alerts and too few people to handle them. Over time, the problem worsens because the number of devices generating alerts increases at a much faster rate than...

Security / InfoSecIsland - 1 month ago

The AWS Bucket List for Security

With organizations having a seemingly insatiable appetitefor the agility, scalability and flexibility offered by the cloud, it’s little surprise that one of the market’s largest providers, Amazon’s AWS, continues to go from stren...