What Is an Intrusion Detection System? Latest Types and Tools

Keeping your network safe from intrusion is one of the most vital parts of system and network administration and security. If your network is penetrated by a malicious attacker, it can lead to massive losses for your company, including potential downtime, data breaches, and loss of customer trust. An intrusion detection system (IDS) is a … Read moreWhat Is an Intrusion Detection System? Latest Types and Tools

2019 Best Software Updater

It can be hard to keep on top of all the software on your computer, especially if every time you open a program it tells you it needs updating. Luckily, you can install a software updater to manage this process for you. The importance of software updaters is twofold: first, they make sure you’re using … Read more2019 Best Software Updater

SQL Server Security Best Practices for 2019

Whether you’re running an instance of open-source MySQL or Microsoft SQL Server, you need to be certain you have robust, high-quality security measures in place. This is extremely important for preventing malicious access to your database, particularly if sensitive or personal data is stored on your servers. In this article, I cover the essential SQL … Read moreSQL Server Security Best Practices for 2019

The Worst DNS Attacks

The Domain Name System (DNS) vies with the Border Gateway Protocol (BGP) for the title of “Achilles heel of the internet.” If you want to take down large swathes of the internet in a single event, DNS and/or BGP are how you’d go about it. Over the past few decades, there have been innumerable security … Read moreThe Worst DNS Attacks

DNS Over HTTPS: Why, How, When, and What Is It, Exactly?

DNS, the old standby of name resolution protocols, has been with us for a long time and will be for a long time to come. But like any “old standby” protocol, DNS has some imperfections. Like many early internet protocols, DNS was designed with an almost total lack of security. Finding an IP address via … Read moreDNS Over HTTPS: Why, How, When, and What Is It, Exactly?

10 Best SIEM Tools in 2019

SIEM solutions are a crucial part of log management and comprehensive security. For businesses looking to add to or upgrade their solutions, here is the best SIEM tools list for 2019. Security information and event management, or SIEM, provides insights into a corporate IT environment through functions like log management and security information management. Just … Read more10 Best SIEM Tools in 2019

How to Stop, Prevent, and Protect Yourself from a DDoS Attack in 2019

Distributed denial-of-service (DDoS) attacks are increasingly becoming a problem for global companies that have a significant portion of their business online. Knowing how to stop a DDoS attack is vitally important, especially considering that it can cost a business significantly in lost revenue. This might mean employing protection tools — my personal pick is Security … Read moreHow to Stop, Prevent, and Protect Yourself from a DDoS Attack in 2019