Related Articles
DDoS Attacks
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic to a web property. In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource ...
Cyber-Insurance
A specialty insurance product intended to protect businesses from Internet-based risks, and more generally from risks relating to information technology infrastructure, information privacy, information governance liability, and related activities.
Man-in-the-Middle Attacks
A man-in-the-middle attack requires three players. There’s the victim, the entity with which the victim is trying to communicate, and the “man in the middle,” who’s intercepting the victim’s communications. Critical to the scenario is that the victim ...
Vishing
Voice phishing, or vishing, is the use of telephony to conduct phishing attacks. Landline telephone services have traditionally been trustworthy; terminated in physical locations known to the telephone company, and associated with a bill-payer.
SOC-as-a-service
A subscription- or software-based service that manages and monitors your logs, devices, clouds, network and assets for internal IT teams. The service provides companies with the knowledge and skills necessary to combat cyber-security threats.