What is key stretching: password security
Securing our online identities and sensitive data starts with robust password creation. Yet, human nature often leads us to choose simplicity, favouring easily memorable phrases or words with personal significance. Unfortunately, these choices often make us vulnerable to cybercriminals who
Meet the talent: Bleon Proko, Cloud Security Researcher
Place of residence: As of September of 2023, in Massachusetts, USA. Originally from Albania Position: Currently working as a Cloud Security Researcher at Permiso, where, together with the rest of the P0 Team, we try to find new attacks on different
Unpacking the Snowflake breach: what went wrong
Security researchers worldwide say the Snowflake breach will be for cloud identity attacks, which is like WannaCry was for ransomware. In July 2024, Snowflake, a leading cloud data warehousing company, experienced a significant security breach that sent shockwaves across the
Facebook hacks: the latest risks
Facebook hacks: Without a doubt, today, most lives are centred online, and Facebook is among the few social media platforms that serve both personal and professional lives. However, as the platform's popularity grows, so do the associated risks. Because threat
Mastering application security: best practices to follow
Are your applications bulletproof against today's sophisticated cyber threats? Engineers understand that robust application security is not optional—it's critical. Effective security testing methodologies, specific strategies, and industry best practices can significantly enhance your defences. How prepared is your organisation to
How to use SIEM to optimize your security posture
Security Information and Event Management (SIEM) systems have emerged as a crucial tool for organizations aiming to bolster their security posture. By providing real-time analysis of security alerts and aiding in the detection of anomalies, SIEM systems can significantly enhance
What is application security and why do you need it?
The exponential growth in the volume of applications being developed, distributed, and patched across networks has entered an era of heightened vulnerability. Cyber hackers are always looking for vulnerabilities and will take advantage of anything that gives them access to
How to manage password expiry in Windows
Manage password: Encountering the message "Your password has expired and must be changed" on your Windows login screen can be a hassle. This happens because Windows local accounts are set to require password changes every 42 days by default. Fortunately,
What is Hybrid Cloud Security?
With the increasing adoption of cloud computing, the complexity of managing and securing these environments has grown significantly. Hybrid cloud security has become a crucial aspect of modern IT strategy, aiming to protect data and applications across a mix of