by | Sep 10, 2020 | Cloud Security, Security
The news is filled regularly with attacks on misconfigured cloud servers and the leaked data that criminals obtain from them. The errors happen because we are all human. We might set up a cloud server with loose (or no) credentials and forget to tighten them when the...
by admin | Jul 1, 2020 | Cyber Crime
Venmo scams take several forms and shapes, and potential scammers are easier to pinpoint than others. The Better Business Bureau has recently warned customers regarding a Venmo digital wallet scam that involves malicious actors accidentally sending money to users. It...
by | May 7, 2020 | Password Security, Security
Password recycling or using easy-to-guess passwords are just two common mistakes you may be making when protecting your digital accounts Typing in a password to access one of the tens or hundreds of services that we use has become such an everyday part of our lives...
by | May 7, 2020 | Application Security, Security
As more organizations shift data and workloads to the cloud, many are relying on containers—units of software that package code and its dependencies so that applications run reliably when moving from one computing environment to another. Containerization is heralded...