Author Archives: Onsite Computing, Inc.

Application detection and response is the gap-bridging technology we need

The concept of detection and response is far from new in cybersecurity — in fact, it’s a core part of the NIST Cybersecurity Framework (CSF) and a fundamental part of any sound cybersecurity program. You must be able to both detect threats and malicious activity and respond to them, regardless of where they occur and […]

The 18 biggest data breaches of the 21st century

In today’s data-driven world, data breaches can affect hundreds of millions or even billions of people at a time. Digital transformation has increased the supply of data moving, and data breaches have scaled up with it as attackers exploit the data-dependencies of daily life. How large cyberattacks of the future might become remains speculation, but […]

5G and SASE: Reimagining WAN Infrastructure

Cellular connectivity was often relegated to a failover connection option. Because of its mobile or remote nature, 5G was used as a primary connection for vehicle fleets, IoT devices, and remote workers in places where wired broadband wouldn’t work or couldn’t be obtained. But this sentiment is changing. More and more organisations recognise 5G for […]

WordPress Mandates Two-Factor Authentication for Plugin and Theme Developers

WordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and themes to activate two-factor authentication (2FA) mandatorily. The enforcement is expected to come into effect starting October 1, 2024. “Accounts with commit access can push updates and changes to plugins and themes used by millions of WordPress […]

Oracle adds Zero Trust Packet Routing capability to its cloud platform

Oracle has added a new zero trust capability to its cloud platform which it says prevents corporate data from being inadvertently exposed through network misconfigurations. Zero Trust Packet Routing for Oracle Cloud Infrastructure (OCI) enables organizations to set security attributes on resources and write natural language policies that limit network traffic based on the resources […]

TLS security subverted due to CA use of outdated WHOIS servers

WHOIS clients across the internet, including those used by email servers and Certificate Authorities (CAs), are relying on outdated records for WHOIS servers, potentially allowing attackers to hijack old WHOIS server domains and impersonate domain owners, security researchers have found. This opens the door to a variety of attacks including obtaining rogue TLS certificates for […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.