Why a Picture Is Worth a Thousand Files

The world is a visual place. Communication with photos and short videos has now become commonplace thanks to applications like Instagram and TikTok. Photos are easily taken from accessible devices and used to share information such as events, news, and even emotions at a rate and speed unlike anything before. But what many may not realise is that photos can also be used to inconspicuously share data or carry out a cyber-attack.
The practice of concealing messages, images, or files within other messages, images, or files is called steganography. It comes from the Greek word steganos (covered) and the Latin word graphia (graphy). With the popularity of photos and images, this hacking method will likely increase and continue to see success.

Read more

Applying UX Design To Cybersecurity

If there’s one thing businesses should always focus on, it’s user experience (UX). If users aren’t having a good experience with your product, brand, or another aspect of your business, your company’s bottom line is suffering because of it. Increasingly, cybersecurity is becoming a big part of the user’s experience. Keep reading to find out more about how the two intersect, and how you can apply UX design to cybersecurity.

Read more

Why Mid-Market Enterprises are Becoming Top Targets for Cyber Criminals (and What They Can Do to Prevent It)

In the last few years, many large businesses have overhauled their approach to cyber security. The rise of remote working forced them to bring forward long-planned upgrades to both security technology and processes, resulting in far better data security across the board.
On paper it seems like very good news, but it isn’t necessarily for everyone. Why? Because the majority of cyber criminals are opportunists looking for the quickest and easiest way to make the maximum amount of money possible from victims. Consequently, they tend to target larger businesses that have more assets for exploitation. However, as these large businesses continue to shore up their cyber defences, cyber criminals have started looking elsewhere for easier targets, and many of them are turning their attention to lesser protected mid-market enterprises instead.

Read more

The Power of eBPF for Cloud Native Systems

By 2025, Gartner estimates that over 95% of new digital workloads will be deployed on cloud-native platforms, up from 30% in 2021. At the same time, Kubernetes is becoming the de facto standard for cross-cloud orchestration and a pillar of cloud native architectures.
A contributing technology that will play a big role in this transition is the extended version of the Berkeley Packet Filter (eBPF). eBPF enables programs to run in kernel of the host operating system (Linux, first, and now also Windows), and to instrument the kernel without changing kernel source code. eBPF programs are portable between kernel versions and atomically updateable, which avoids workload disruption and node reboot. eBPF programs can be verified at load time to prevent kernel crashing or other instabilities.

Read more

10 Steps for Better Website DDoS Protection

All over the world, DDoS attacks are getting more frequent and last longer, too. We’re officially sailing in rough water. And not all of our ships are sea-worthy. A study by IDG found that the lack of broad DDoS protection was among the top 3 security challenges faced by organizations.
Realizing this, many companies sought help with specialized mitigation services. This is a great first step. But there are still lines to tighten and halyards to replace. Different resources have varying degrees of DDoS resistance. And using a third-party solution is not always enough.
Let’s look at 10 steps you can take to improve your DDoS protectability. And, hopefully, find a safe mooring in this raging hurricane of junk traffic.

Read more