Blog

Home  Blog

What is a spam trap?

A spam trap is an email address that’s used to identify and monitor email spam. It’s also a type of honeypot because it uses a fake email address to bait spammers. Internet service providers (ISPs), antispam organizations, blocklist providers and corporations use spam traps to monitor and reduce the amount of spam traffic to their […]

Explore More

What is a whaling attack (whaling phishing)?

A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the chief executive officer (CEO) or chief financial officer, in order to steal sensitive information from a company. In many whaling phishing attacks, the attacker’s goal is to manipulate […]

Explore More

What is acceptable use policy (AUP)?

An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to or use of a corporate network, the internet or other computing resources. Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID. From an IT […]

Explore More

MFA required for AWS Organizations member accounts in 2025

Amazon will require MFA on member accounts in AWS Organizations beginning in Spring 2025, the company announced Friday. Amazon’s latest announcement comes at the heels of other tech giants similarly announcing expansions of their MFA requirements. Last week, Google Cloud announced it would roll out MFA requirements for all users beginning this month until the […]

Explore More

Palo Alto Networks PAN-OS management interfaces under attack

Palo Alto Networks confirmed Thursday that a critical zero-day vulnerability in its firewall management interfaces is under exploitation in the wild. The vulnerability, which the vendor tracks as PAN-SA-2024-0015, is an unauthenticated remote command execution vulnerability in PAN-OS firewall software that Palo Alto Networks assigned a 9.3 CVSS score. Word of a potential flaw came […]

Explore More

What is identity governance and administration (IGA)?

Identity governance and administration (IGA) is the collection of processes and practices used to manage user digital identities and their access throughout the enterprise. IGA represents two areas: Identity governance addresses issues of organization, providing practitioners with network visibility, roles, attestation or proof, segregation of duties (SoD), reporting and analytics. Identity administration handles issues of […]

Explore More

Infoblox: 800,000 domains vulnerable to hijacking attack

Infoblox warned that threat actors are increasingly exploiting misconfigured DNS name servers to hijack domains using a technique that’s difficult for victims to detect. The network security vendor published a new report Thursday titled “DNS Predators Attack: Vipers and Hawks Hijack Sitting Ducks.” The report expands on an attack vector dubbed “Sitting Ducks” that Infoblox […]

Explore More

CISA, FBI confirm China breached telecommunication providers

CISA and the FBI confirmed that Chinese nation-state actors have compromised telecommunications provider networks to spy on government and political leaders in what the agencies called a “broad and significant cyber espionage campaign.” The government agencies published a joint statement on Wednesday, which said the U.S. has been investigating the People’s Republic of China targeting […]

Explore More

8 ways enterprises can enhance object storage security

Data stored as objects can take many different forms and sizes, such as analytical data and video files, and volumes can run high — think petabytes. As a result, object storage security is essential to protect data from hackers, ransomware, and other cyberattacks and risks. The eight best practices for object storage security here include […]

Explore More

CEO: GenAI changes multi-cloud security, network equation

Generative AI presents enterprises with higher cloud costs than traditional workloads, complicating multi-cloud security and networking, according to one industry CEO. Data gravity and the cost of GPU-based computing infrastructure that’s required for generative AI (GenAI) mean many enterprises are choosing to move AI apps to various locations, including back on-premises, according to Doug Merritt, […]

Explore More

Let’s Work Together!
Just Drop Us a line - [email protected]

Subscribe to our Newsletter

copyright 2024 by Digital Creations LLC