cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
What is an IP Address?
Before we understand what an IP address is and does, we must first know what IP stands for. IP is an acronym for Internet Protocol. It is the primary protocol that the internet uses to communicate within its network. Encapsulated in network packets or datagrams, information is transmitted through the Internet Protocol Suite. This is basically how we are able to send and receive and transmit information through the internet.
By Virginia E. Lucas6 years ago in 01
7 Critical Things New Cybersecurity Leaders Should Pay Attention to Early in Their Careers
You always wanted to become a cybersecurity professional and you succeeded in achieving your goal after years of hard work and dedication. Now, you are promoted to the hot seat of cybersecurity leader in your organization. The first thing you will notice after being promoted to the leadership role is that it is a different ball game altogether.
By Sophia Lan6 years ago in 01
SAST vs. DAST: Understanding the Differences Between Them
The exponential rise in malicious activities and cybercrime has made companies pay more attention to application security. It has also sparked widespread discussion about the benefits and challenges of various application security testing solutions available in the market.
By Cypress Data Defense6 years ago in 01
After Analyzing 32 Million Passwords, This Is What I Can Say
The humunguous task of analyzing passwords I started, I had to first collect data. Fortunately for me, I finally ended up more than I, me and anybody could have thought. Yes, a whopping 32 million passwords, which also tells that it is easy for your passwords to get leaked. That is the status quo of security in front of you.
By Abhishek Verma6 years ago in 01
How to Protect Your Data from Unauthorized Access
Data protection is one of the primary concerns of organizations around the world today. Information security (InfoSec), which is primarily about prohibiting unauthorized access to information, is what makes data protection possible.
By Cypress Data Defense6 years ago in 01
6 Password Security Risks and How to Avoid Them
You know what? People suck at passwords. We use weak passwords, we reuse passwords. Or we write down passwords or store them in equally insecure ways. These practices make our data very vulnerable. It’s no surprise then that attackers go after them.
By Cypress Data Defense6 years ago in 01
Encryption is the only thing protecting our kids on the internet today
We as parents are supposed to be extra cautious when letting our kids use the internet. But sadly, that’s not the case. I’m not talking about setting up parental control to block 18+ content, but rather, I’m talking about sharing every little detail about our children online.
By Timothy Marzano6 years ago in 01



