What is email spoofing and why it can seriously damage your company’s reputation?

Business websites generally have the same overall purpose: to turn visitors into customers and encourage a healthy profit. Naturally each website has its own goals and requirements, which vary widely across different sectors and industries, but there’s one common theme…
On a hot day in June, the cloud security faithful gathered in London to discuss where security for the cloud is heading. The annual Cloud Security Summit was an excellent opportunity for business leaders and security veterans to explore some of…
Yesterday, the team from Intel released a statement regarding Microarchitectural Data Sampling (MDS) – also referred to as ZombieLoad – a significant security vulnerability that affects cloud providers with multi-tenant environments, including our providers. Left unmitigated, this vulnerability could allow…
Some two years ago, Google made a pledge: It would name and shame websites with unencrypted connections, a strategy designed to spur web developers to embrace HTTPS encryption. Now, it finally is following through. With the launch of Chrome 68, Google now will call…
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity. A…
Floating IPs let you redirect network traffic between any of your instances within the same datacenter. With Floating IPs, you can create highly available server structures without a single point of failure: