Top cloud threats in 2019: secure your infrastructure

Top cloud threats in 2019: secure your infrastructure

Top cloud threats in 2019: secure your infrastructure A lot of companies prefer to use cloud environment in order to store clients’ data there. It is a convenient way and offers many flexibility. But how to make these remote storages well protected from cloud...
Catch them! Secrets to detect attackers Maltese workshop

Catch them! Secrets to detect attackers Maltese workshop

Catch them! Secrets to detect attackers Maltese workshop Malta Blockchain Summit is a place where business representatives from Crypto Marketplaces, Online gaming, and gambling & Financial Technology companies meet up to network and receive up to date information....
Monitoring connections to MySQL hosted on Amazon RDS

Monitoring connections to MySQL hosted on Amazon RDS

Monitoring connections to MySQL hosted on Amazon RDS Intro Working for our client with a database hosted on AWS, we have faced the case of monitoring security of user connections to MySQL. According to safety measures it was important to detect unusual user activity...
IoT attack simulation

IoT attack simulation

IoT attack simulation Internet of Things rapidly changes lives of millions of people. The ramp up of technology also comes with security risks that are usually underestimated. In today’s world of “always on” technology and not enough security awareness on the part of...
Anomali and UnderDefense partnership

Anomali and UnderDefense partnership

Anomali and UnderDefense partnership Anomali is one of the most comprehensive Threat Intelligence Platforms. It boosts the reaction of analysts in Security Operations Center to unknown threats and investigate incidents faster. We are proud to have such a strong...

Pin It on Pinterest