All-In-One Spring Security Crash Course for Java Developers
Feb 9, 2021
Whenever we build an application, security may not exactly be the first thing we think about. Yet, it is one of the most important features that need our attention. In this article, we will cover some key ways...
Understanding Hashing in Cryptography
Jan 5, 2021
Hashing is a form of computer security that enables data integrity and authentication. Hashing, in most cases, is mistaken with encryption. Hashing is different from encryption. In this article, we will explore...
Comparing Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
Dec 22, 2020
Intruders are always ready and determined to cause data breaches, install malware, and steal sensitive information. Research shows that websites are hit with 22 cyber-attacks in a day, on average. Embracing...
What is Ransomware?
Nov 18, 2020
In a world where computers are an essential part of life, it is only reasonable to have a healthy fear of cyber security threats. Cyber attacks are happening in the range of hundreds of thousands of attacks per...
Artificial Intelligence for Smarter Cybersecurity
Nov 13, 2020
Organizations continue to embrace the Internet of Things (IoT), the cloud, and mobile technology. This has influenced considerable changes in the threat landscape and created more vulnerability points.