Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Logsign

Cybersecurity in Hospitality Industry

With the invention and widespread use of new technologies, many processes related to the hospitality industry are reliant on the use of internet and electronic devices. Keep reading to learn how you can keep your business safe while keeping up with the technology. As of today, we can book a hotel room, specify our needs regarding the stay (e.g. extra towels, room service, airport shuttle etc.) and even pay for it using only our smartphones.

How to Maintain Service Oriented Architecture Security

Service Oriented Architecture has been one of the buzzwords in the cyber security community for a while. In this article, we will discuss what it is and how you can implement SOA security. What is Service Oriented Architecture Security? Service Oriented Architecture (also known as SOA) refers to a unique style of software design. In Service Oriented Architecture, the services are provided by application components using a communication protocol over the network.

SCADA Cybersecurity Framework

SCADA stands for Supervisory Control and Data Acquisition. It is a control system architecture that comprises computer systems, networked data communications, and Graphical User Interface (GUI) for a high-level process supervisory management. In addition, SCADA also incorporates other peripheral devices such as discrete Proportional Integral Derivative (PID) and Programmable Logic Controllers (PLC) to interface with process machinery or plant.

How Can Companies Protect Themselves Against Drive-By Cyber Attacks?

Drive-by download attack is one of the most popular methods employed by hackers nowadays. What is it? How can you protect your organization from it? Keep reading to learn! Malware attacks have been preserving their popularity amongst the hackers for a while. They are relatively easy to implement when targeting medium to small scale organizations, they can go unnoticed for a very long time and extract information from the target quietly.

How Does XOR Cipher Work?

XOR cipher is very easy to implement and offers a strong protection against brute force attacks. Keep reading to learn more! In today’s world, we use internet and communication technologies on a daily basis for pleasure and business. We send e-mails and files, chat with friends and co-workers, share content on social media, do shopping and so forth. As a result, we send and receive a significant amount of sensitive data every day.

What is ICMP?

Being a supporting protocol in the Internet protocol suite, ICMP is often preferred by network devices to send error messages and similar information. Keep reading to learn more! In order to maintain the security and safety of networks, maintaining a successful communication between devices is essential. That is why protocols like ICMP are very important and popular as of today. In this article, we will discuss what ICMP is and why you need it. What is ICMP?

What is Stateful Packet Inspection?

Stateful packet inspection is also known as the dynamic packet filtering and it aims to provide an additional layer of network security. Keep reading to learn more! In business environments, we use network technologies very often. They allow us to share resources and files, set communication protocols and such. As much as they streamline and accelerate our business processes, they can also pose a serious vulnerability for our cyber security.

WarXing in Cyber Security

Warcarting, war dialing, wartoothing, wardriving, wartransit… Also known as NetStumbling or WILDing, WarXing is a search of Wi-Fi networks. Keep reading to learn more! In our hyper connected world, an active and stable internet connection is akin to oxygen. Our smartphones, tablets, computers and even smart watches need internet connection to fulfil the entirety of their functions.