VPNs and Work From Home: Security under scrutiny in times of COVID-19

VPNs secures communication between company servers and employees’ devices, but end user devices are exposed if not secured enough. Also, other compensating measures need to be in place. Courtesy of The Cyber Security Hub™ (TCSH), I would like to depict a link that TCSH had pointing to, citing that Work From Home(WFH) using VPN isContinue reading “VPNs and Work From Home: Security under scrutiny in times of COVID-19”

Ransomware mitigation with backups. It might work well for small or medium companies that cannot afford huge budgets for securing their systems

Provided that certain conditions are met In a previous page I wrote about the balance that always has to be reached between costs in risks, including cyberattacks. So, I have expressed the opinion that there is no point in spending too much on some fancy security tool that covers a risk that, if occurred, itContinue reading “Ransomware mitigation with backups. It might work well for small or medium companies that cannot afford huge budgets for securing their systems”

Snyk – 1 billion (possible) valuation

Their model Snyk innovation is to fit security in the development process. In any development software company, during their development process, a separate security team takes the code offline and reviews it checking vulnerabilities in code (non necessarily aiming to find bugs). For example, they look into code and detect risks and recommends protecting againstContinue reading “Snyk – 1 billion (possible) valuation”