Security regulations and audits go beyond firewall policies and implementation, but it’s a good place to start for firewall audit readiness and visibility of your network. The following steps can…
Tahshina
Tahshina
Tahshina has been an avid cybersecurity writer for many years. She is passionate about cybersecurity and enjoys learning and writing about the latest trends, issues and challenges in the industry.
-
-
For many businesses, it’s not until after they suffer from a security breach that web security becomes a priority. An effective web security approach must be defensive and proactive. Let’s…
-
Firewalls are at the heart of any organization’s cybersecurity architecture. But we should not consider them as the ultimate security solution for a business’s cybersecurity needs. Firewall security is useful…
-
A firewall is a firmware or software that prevents unauthorised access to a network. It uses a set of rules to inspect incoming and outgoing traffic and blocks threats accordingly.…
-
Cross-Site Scripting or an XSS attack is a way in which the attacker can potentially steal session cookies and impersonating their victim and gain access to their information. Not only…
-
A network intrusion attack is an unauthorised attack on a digital network that can occur in various ways. It often involves stealing valuable network resources and jeopardising the security of…
-
Organisations that prioritise security must keep vulnerability management as a top priority to establish a clear approach for identifying issues affecting their systems. Vulnerability scanning is a major component of…
-
Cross-site Scripting or XSS is a website security vulnerability that allows a hacker to compromise a user’s interaction with a vulnerable application. XSS attack is a client-side attack where the…
-
What is Tailgating? Tailgating is a social engineering attack. In simple words, tailgating is when an unauthorised person gets access to a restricted area by following an authorised person. People…
-
What is Black Box Testing? In a black box text, the tester does not hold any information about internal working of a system. It is high-level testing that has a…