Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Why Ransomware is Only a Symptom of a Larger Problem

While ransomware is arguably the greatest current security threat to organizations, its rise has distracted us from the true issue at hand: extortion-based crimes. By Jeff Palatt, Vice President, Technical…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Why Ransomware is Only a Symptom of a Larger Problem

Web Application Penetration Testing Checklist with OWASP Top 10

We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Web Application Penetration Testing Checklist with OWASP Top 10

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X