Blockbit Introduces the SD-WAN 2.0 Solution

Blockbit Introduces the SD-WAN 2.0 Solution

Integrated with Blockbit Platform 2.0, the new version of the platform also offers enhanced network management features and zero-touch functionality, which allows for a completely remote configuration. Blockbit, a global cybersecurity product company, presents its...
Can you recognize the most common types of malware?

Can you recognize the most common types of malware?

To recognize which malicious applications we should protect ourselves from is an important step to define a security plan and to choose the right protection controls. So, do you know witch are the types of malware? But first, we need to talk about what is a malware....
Can you recognize the most common types of malware?

Viruses and malware: what’s the difference?

Viruses and Malware are common themes in information security. Although they are cyber threats, there is a difference between them. In a simple and straightforward way: viruses are types of malware, whereas the reverse does not apply. Present in the security glossary...
Encryption is a must, inspection too

Encryption is a must, inspection too

Cryptography applied to data traffic is an essential security technique that every company can relate. On the one hand, it is a growing demand to maintain information confidentiality, especially with the increasing number of data leakage events. However, one should...
The challenges of GDPR

The challenges of GDPR

This subject will address different demands within the compliance rules that all global companies should follow. Privacy is not a new topic for the security industry, especially with the digital transformation and multiplication of connected devices able to collect...