figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Results for: cybersecurity

slider item
Your Innovation Feed

5+4 = The New Cloud Security Stack

Eli Arkush 09.06.21

Infrastructures, threat, and security are all under a quick, constant evolution. Once every few year there comes a tipping point which forces us to rethink our technology posture. 2020 was that tipping point. The cloud surge has peaked during the Pandemic, as remote work became the new normal for most office-based businesses. This has introduced […]

Read more
slider item
Open Source & Code Security

SolarWinds Orion Security Breach: A Shift In The Software Supply Chain Paradigm

Guest Writer 31.05.21

The recent SolarWinds breach highlights a new paradigm in the Software Supply Chain. When compared simply to the code itself without any additional tools, Proprietary Code is no more secure than Open Source. By contrast, many would argue that Open Source Code is more secure due to a faster fix/patch/update cycle and the pervasive access to source […]

Read more
slider item
Infrastructure DDoS

DDoS (Distributed Denial of Service) Explained

Francesco Altomare 21.04.21

DDoS Mitigation & Protections services are a crucial part of any internet business strategy. At GlobalDots we analyze, implement and maintain Security for variety of companies, from Fortune 500 to startups and small-to-medium enterprises. Since the topic is broad and many of our customers ask very specific questions, we decided to put together this resource […]

Read more
slider item
Colocation & Hosting

Colocation Explained

Manuel Reischl

Colocation hosting is quickly becoming more common as businesses find themselves increasingly dependent on their IT equipment and the necessity of having their data secure and available at all times. Many companies don’t want the hassle of constantly maintaining and monitoring their equipment, and others don’t have the infrastructure or expertise to do it themselves. […]

Read more
slider item
Cloud Workload Protection

Stop Thinking Detection. Think Correlation

Guest Writer 21.02.21

Why security alerts are useless without proper context, and how to obtain it without sweating it.

Read more
slider item
Open Source & Code Security

Number of Reported Breaches Decrease In First Half of 2020

Dror Arie 24.07.20

Number of Reported Breaches Decrease In First Half of 2020

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure