cloud-1

Difference between a Public Cloud and a Private Cloud

According to the U.S. National Institute of Standards and Technology (NIST), cloud computing is a technology that provides access to non-local resources such as networks, servers, storage, applications, and services.  In other words, this means that you can gain access to resources from devices other than your own. So how are public and private clouds different?  Public ...

toolbox

COVID-19 Toolbox Checkup: Meeting New Data Security Risks

The global pandemic has brought both tragedy and unprecedented change in our personal lives.  But our professional lives have also been dramatically transformed. It’s as if we’re using an entirely new operating system. It’s called the remote workforce. And as if 2020 weren’t challenging enough, IT security managers are suffering their own pandemic symptom ...

business-1

How Much Will a DDoS Attack Cost Your Business?

There’s no doubt that DDoS attacks are becoming more frequent and sophisticated. Cybercriminals are evolving in the duration, techniques, and extent of their attacks, consequently raising the costs of these attacks to businesses.  According to Ponemon Institute study, a DDoS attack will cost an average of $22,000 for every minute of downtime it causes. This means signif ...

6

Cloudbric acquires NIPA Cloud service quality certification

'Cloudbric', a Cloud and edge computing security company, acquired a quality performance certification for its cloud-based web security service, 'Cloudbric WAF' in the cloud computing service (SaaS) sector that is hosted by the Information and Communication Industry Promotion Agency (NIPA).'Cloudbric WAF', Cloudbric's web security service, was certified by fulfilling all seven categories ...

frankenstein

The Rise of Artificial Intelligence (AI) DDoS Attacks

“Automation might be a good thing, but don’t forget that it began with Frankenstein.” — Anonymous.  Frankenstein monster’s intelligence came from a mad scientist. The monster only knew how to carry out instructive and repetitive tasks. Whether they were wrong or right decisions? That was outside the artificial mind of the poor monster.  The s ...

security-leader

4 Trends for Security Leaders to Consider in 2021

If there’s one thing that 2020 taught us, it’s this—predicting the future can sometimes be a sloppy thing to do. When the COVID-19 pandemic waltzed in this year, it threw a curveball on everyone’s plans and predictions.  And yet, 2020 is not going to stop us from making calculated guesses about our future. Your top priority is to control the “ ...

ddos-attack

How to Trace a DDoS Attack?

Can you really track a DDoS attack? Would you be able to find who's behind the attack? Who’s DDoSing you? The first “D” in the compound word “DDoS” is the big problem. Tracking a “Distributed” attack coming from thousands of infected machines turned into bots is no easy task. But using a detective’s most popular tools, like back-engineer ...