What is a CASB (Cloud Access Security Broker)?

What is a Cloud Access Security Broker (CASB)?

A cloud access security broker (CASB) is a software security service that acts as an intermediary between business cloud users and cloud providers. CASBs monitor data flow to and from cloud platforms, ensuring that cloud use comply with information security policies and regulations.  Much as a firewall enables businesses to enforce security policies for incoming […]

DDoS Protection: How to Survive a DDoS Attack

DDoS Protection: How to Survive a Distributed Denial of Service Attack

You’re sitting at your desk when the first notification arrives. Uptime monitoring has detected unusually long response times for the servers hosting the business’s primary web app. Soon after, your manager calls to say customer support is getting complaints—many users can’t sign in and the app is slow for those who can.  You try to […]

Four Ways to Create a Security Culture for Your Workplace

How to Create a Positive Information Security Culture for Your Workplace

What are the most significant security risks facing your organization? Your answer might include common external threats, such as brute force attacks, phishing attacks, ransomware, supply chain attacks, and attacks against vulnerable software, among many others. But the focus on external security risks misses an important point: External attacks often exploit vulnerabilities created by poor […]

Protecting Your AWS Cloud Infrastructure with AWS Network Firewall

Protecting Your AWS Cloud Infrastructure with AWS Network Firewall

AWS Network Firewall is a flexible managed firewall and intrusion detection service. It allows AWS users to control network access to resources within an AWS Virtual Private Cloud (VPC). We explored AWS Network Firewall and how it complements other AWS firewalls in What is AWS Network Firewall? In this article, we’ll dig a little deeper […]

What is AWS Network Firewall?

What is AWS Network Firewall?

Firewalls are among the most useful information security and compliance tools. Their role is to monitor traffic moving between network borders to determine whether it should be allowed to pass. Among other responsibilities, firewalls prevent unauthorized access to networks on which sensitive data is stored, making them an essential tool for businesses seeking to comply […]