Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
How to Get the Absolute Most Out of Your Backup Software
In the past, we could not capture a consistent backup. Operations would simply read files on disk in order as quickly as possible. But, if a file changed after the backup copied it but before the job completed, then the backup’s contents were inconsistent. If another...
Boosting Safety Through Cyber Threat Intelligence to Secure Your Digital Space
In an age where the digital landscape is continually evolving, businesses and individuals alike face increasing threats from a myriad of cyber adversaries. To navigate these challenges, there has been a growing emphasis on the value of threat intelligence in the...
The Golden Rules to Choosing a Backup Provider
The connection point is usually when you have received the bulk of your hardware and software purchase and can put it to use. If you have not even submitted orders yet, that’s ideal. If you already have everything, that’s fine as well. You must design the...
How to Make the Undeniable Business Case for Backup
With the input of business-oriented personnel, you can determine how IT will deliver an appropriate business continuity design. To that end, you need to discover the capabilities of the technologies available to you. Once you know that, you can predict the costs. You...
Advanced Threat Protection for Evolving Email Threats
Email Security – The State of PlayOn Monday morning, James in marketing at YOLO Pty Ltd sees an enticing email on his phone from a vendor that he does a lot of business with. It talks about the upcoming soccer finals being held in his city and offers two tickets for...
Detecting and Preventing Password Spraying Attacks
Passwords are common ways of logging into the system, service, or application. They are typically used in combination with usernames to confirm user identity and gain access to target systems. Even though many of us know passwords should be strong and frequently...
Understanding the Adversary-in-the-Middle Attack – How It Works and How to Defend Against It
What Is an Adversary-in-the-Middle Attack?An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of cyber attack in which an attacker intercepts and relays messages between two parties who believe...
Mastering and Leveraging the MITRE ATT&CK Framework on Cyber Threat Detection
History of MITRE ATTACK Framework The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced Persistent Threat) organizations used against business Windows networks was first addressed by MITRE in 2013. FMX (Fort Meade...