by Miguel Morales | Aug 15, 2022 | IT Support
Business impact analysis is a tool that helps plan for the inevitability of consequences and their cost. It is another measure to combat risk. Risk is always on the horizon and the better-equipped companies that prepare for it, the more likely they will be able to...
by Miguel Morales | Aug 8, 2022 | IT Support
Cross-Site Request Forgery (CSRF/XSRF), also known as Sea Surfing or Session Riding, is a web security vulnerability that tricks a web browser into performing an unintended action. Consequently, the attacker abuses the trust that a web application has in the...
by Miguel Morales | Aug 1, 2022 | IT Support
A well-planned cyberattack against a government or a large company is a terrifying prospect. Particularly when the attack is designed to infiltrate a network for an extended time to steal sensitive data. This type of campaign is known as an advanced persistent threat...
by Miguel Morales | Jul 18, 2022 | IT Support
Collision attacks are a major concern in the realm of cryptography. Under certain circumstances, they can be used by an attacker to undermine the security provided by digital signatures, allowing them to make data appear fraudulent as if its integrity and authenticity...
by Miguel Morales | Jul 11, 2022 | IT Support
In today’s guide, we’ll start our journey by reviewing Kerberos, examining its pitfalls, and going into detail about why the old crypto apparatus exposed critical vulnerabilities that led to the extraction of such sensitive data with so little relative...
by Miguel Morales | Jul 4, 2022 | IT Support
Chaos Engineering allows you to compare what you think will happen with what happens in your systems. Literally “break things on purpose” to learn how to build more resilient systems. By proactively testing how a system responds under stress, failures can...