shadow IT
In the recent past, remote work has become a common practice throughout the world. Many employees regard this as a flexible option since they get to work from places where they are most comfortable.  Although working remotely enhances the work-life balance and employee productivity, there is a downside to it. There are real cybersecurity threats with remote work, which put your organization’s data at risk. A recent report published on Forbes indicates that remote employees
Guest Contributor   , , ,
covid19 email phishing scam
The current pandemic has sent a tremendous army of office workers home. This is indeed a challenge for many specialists who are used to working in teams. However, it imposes even greater challenges to IT support teams whose task is to ensure that their employees are cyber secured in the remote work environment. Evidently, the number of attacks on big companies’ systems is growing during such unprecedented times. Thus, for many businesses, the top priority
Guest Contributor   , , ,
A VPN (Virtual Private Network) typically operates by establishing a secure connection by creating an encrypted tunnel between the user and the VPN’s web server. In other words, a VPN creates a private network utilizing the internet; this ‘virtual’ private network works not unlike a secure intranet, so users can remotely connect to web servers including otherwise private corporate servers. As all data is encrypted, even if the data is intercepted by a third party,
Feature Updates   , ,
Cloudbric’s Remote Access Solution is a cloud-based, secure remote working solution for businesses. It connects users to their workplace by sending all traffic through a secure and encrypted connection. Only authenticated users will be able to access your company information and data, regardless of device or access location.  Hassle-Free Secure Remote Access One of the biggest benefits of Cloudbric’s Remote Access Solution is that it is a hands-off solution. This means that minimal effort is
Announcements   , , ,
secure remote working computer
The COVID-19 pandemic has directly affected our lives all around the world, not only the way we live but also the way we work.  Many businesses in the world now have drastically changed their operations by going online and having employees connect to corporate networks.  Remote access vulnerabilities This type of remote working or remote access during COVID-19 has opened up many vulnerabilities in cyberspace which can leave businesses vulnerable.  With hasty transitions in dire
Feature Updates   , , , , ,
swap waf ddos ssl
Background: How did SWAP come to be? As many are aware, Cloudbric entered the web application security field with the support of Penta Security Systems, Asia’s top cybersecurity vendor. Cloudbric spun off as its own independent cloud security company bringing over 20 years of IT experience. Now, we offer SWAP (Smart Web Application Security), DDoS protection, and SSL-as-a-service together as a cloud-based solution for complete web protection.   SWAP provides industry-leading detection precision thanks to our
Feature Updates   , , , ,
swap smart web application protection security
In recent months, Cloudbric has overdone a major brand redesign. Along with a new look, we’re pleased to announce SWAP. SWAP is a cloud-based web application protection solution based on artificial intelligence.  Previously, Cloudbric released the beta launch of its machine learning AI (artificial intelligence) engine for users to test out via their security dashboards. Now, this soon to be patented AI technology is at the very core of SWAP.  WAP incorporates the revolutionary AI-based
Web Security Tips   , , ,
Data protection laws around the world are changing the way businesses handle customer data. The healthcare industry, in particular, is under scrutiny due to the rise of high-profile cyberattacks aimed at some of the biggest healthcare providers.  Health organizations around the world are faced with numerous challenges so far as privacy laws and industry regulations are concerned.  Challenges for the healthcare industry regarding customer data Whether it’s lax access control, outdated software systems, or overall
Web Attacks & Trends   , ,
WAFs are among the most common security controls used by organizations in both the public and private sectors to protect their web applications against common web exploits. Driven by the extensive growth in attack volume against web applications, the global WAF market size is expected to reach $6.89 billion by 2024. What else is driving this growth across industries? Driver of WAF adoption In a research study by Computing, 62% of  IT decision makers surveyed
Web Security Tips   , , ,

October 14, 2019

3 Ways to Secure WAF APIs

In a recent cloud WAF hacking, many customers were alarmed when private API keys, salted passwords, and SSL certificates were revealed to have been compromised. It’s clear from this specific hacking incident that the appropriate steps were not taken to protect customers’ data. One proper security measure that was overlooked was API security. API security is concerned with the transfer of data connected to the internet, which means broken, exposed, or hacked APIs can lead
Web Attacks & Trends   , ,