Posts by author
Panda Security
Careful! HTTPS is not synonymous with security
HTTPS pages use SSL (Secure Sockets Layer) or TLS (Transport Layer Security) protocols to encrypt connections. But does HTTPS really make a website safe?
What will happen with WHOIS when GDPR is implemented?
The current public WHOIS system, that enables you to find the names and contact details of the owners of a domain, is incompatible with GDPR’s data protection principles.
Massive data breaches just one month before the arrival of the GDPR
With the new General Data Protection Regulation just weeks away, the he security and privacy of personal data is once again a cause of concern and debate for business organizations.
Memcached, the latest DDoS attack
Memcached has become cybercriminals weapon of choice to carry out DDoS attacks.To prevent it is crucial to have a detection and mitigation plan.
Soledad Antelada: “In the US, cybersecurity is a national priority”
Soledad Antelada has a key task: guaranteeing the security of a system in which thousands of people work.
How can I protect my company’s VPN?
VPN stands for virtual private network. Simply put, it’s a private network created on the internet or within another network.
What happens if I violate GDPR?
Less than 65 days. That is how long is left until GDPR comes into force. Is your company prepared?