by Liquid Video Technologies | Feb 5, 2021 | Cybersecurity, Network Security, Security
The far-reaching SolarWinds Orion attack has catapulted supply chain security vulnerabilities into the spotlight – particularly those involving the third-party software applications and hardware components that comprise much of today’s enterprise IT environments. The...
by Liquid Video Technologies | Jan 29, 2021 | Cybersecurity, Network Security, Security
With so much of the world transitioning to working, shopping, studying, and streaming online during the coronavirus pandemic, cybercriminals now have access to a larger base of potential victims than ever before through cyber-attacks. “Zoombomb” became the...
by Liquid Video Technologies | Jan 27, 2021 | Cybersecurity, Network Security, Security, Technology News
The 16th edition of the World Economic Forum’s (WEF) Global Risk Report was released on Tuesday, and many of the risks/threats contained are unsurprising. The results are based on the Global Risks Perception Survey and were completed by 650 members of the World...
by Liquid Video Technologies | Jan 25, 2021 | Cybersecurity, Network Security, Security
When you are a startup, there are umpteen things that demand your attention. You must give your hundred percent (probably even more!) to work effectively and efficiently with the limited resources. Understandably, the application security importance may be pushed at...
by Liquid Video Technologies | Jan 22, 2021 | Cybersecurity, Network Security, Security
If there’s one thing we learned in 2020, it’s how to adapt. Companies compressed years-long digital transformation plans into a matter of weeks. Companies that “don’t do remote” suddenly had to “do remote” and found it...
by Liquid Video Technologies | Jan 20, 2021 | Cybersecurity, Data Breaches, Network Security, Networking, Security, Security Breach, Technology News, Uncategorized
Why Designated DNS-over-HTTPS? The U.S. National Security Agency (NSA) on Friday said DNS over HTTPS (DoH) — if configured appropriately in enterprise environments — can help prevent “numerous” initial access, command-and-control, and exfiltration...
Recent Comments