IT Security Articles

Sorted By: Most Recent
Akshay Kumar Akshay Kumar
Updated on November 22, 2023

Guide to Using SSH Port Forwarding (SSH Tunneling)

SSH port forwarding is a method for safely transmitting data over an encrypted SSH connection between a local and distant server. Here’s what to know.

Guide to Using SSH Port Forwarding (SSH Tunneling)
Vaidotas Šedys Vaidotas Šedys
Updated on October 25, 2023

How Open Source Intelligence Can Protect You From Data Leaks

In honor of cybersecurity awareness month, our expert explains what OSINT is, how it works, and what you should be focusing on to protect yourself right now.

How Open Source Intelligence Can Protect You From Data Leaks
John Funk John Funk
Updated on October 17, 2023

5 Lessons From the MGM and Caesars Casinos Cyberattacks

The cyberattacks that cost the casinos more than $100 million is quickly becoming a case study for future cyber threats. Here’s what business leaders can learn from it.

5 Lessons From the MGM and Caesars Casinos Cyberattacks
Amir Tarighat Amir Tarighat
Updated on October 02, 2023

Here’s Why Startups Shouldn’t Over-Rely on SOC 2

Systems and Organization Controls 2, or SOC 2, is only part of a comprehensive cybersecurity program.

Here’s Why Startups Shouldn’t Over-Rely on SOC 2
Katlyn Gallo Katlyn Gallo
Updated on September 27, 2023

What Is a CDN?

Chances are you interact with CDNs (content delivery networks) on a daily basis, but what exactly is a CDN and how does it work? Our expert explains.

What Is a CDN?
Alex Vakulov Alex Vakulov
Updated on July 20, 2023

What Is a Security Operations Center (SOC)?

Here’s what you need to know about security operations centers, a crucial defense against cyberthreats.

What Is a Security Operations Center (SOC)?
Alex Vakulov Alex Vakulov
Updated on June 28, 2023

XDR: A Tutorial

XDR, or extended detection and response, integrates multiple security tools into a unified security incident detection and response platform.

XDR: A Tutorial
Sascha Giese Sascha Giese
Updated on June 14, 2023

How Combining Observability With Edge Computing Ensures Greater Productivity

Edge computing offers faster data processing times, but introduces opacity into an IT system. Coupling it with observability can help ensure a smoother workflow.

How Combining Observability With Edge Computing Ensures Greater Productivity
Molly Fosco Molly Fosco
Updated on February 20, 2020

The People-Centric Data Security Solutions Companies Are Prioritizing

As data protection becomes a more formal business priority, many organizations are using new tools to upgrade their online security.

The People-Centric Data Security Solutions Companies Are Prioritizing