Blog

Is It Legal To Evaluate a DDos Mitigation Service?

This month we are sharing a blog from our partner Radware that takes a look at DDoS mitigation testing.

A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks.

more →

Blog

What is the future of HTTPS?

Iain Westwood

With yet another data breach in the news, and the focus on digital security at the forefront of most people’s minds, I thought it would be a good time to review the history of HTTP, and the role it plays in current (and future) security measures.

A brief history of HTTP, SSL and TLS
It’s a safe bet that when Tim Berners-Lee was working on HTTP in the 1980’s, he couldn’t have anticipated the hand his new protocol would have in creating and shaping the digital world we all know today. 

more →

Blog

Cyber Insurance: Risk vs Reward

Oliver Sears

Technology, social media and business transactions over the internet are key for the success of most organizations in terms of conducting day-to-day business and reaching out to prospective customers. As well as facilitating business they also serve as gateways to cyberattacks. Regardless of who launches them, these attacks can cause huge reputational and monetary damage.

more →