Firewalls are local network security devices that provide traffic filtering and centralized network control.In this article, we will talk about the features of these systems, how to choose NGFW or UTM, and, of course, about the domestic counterparts themselves. Difference ...

Information security (IS) is responsible for protecting corporate networks, confidential and raw data, mobile applications, social networks, cloud computing, etc. It includes: infrastructure security, cloud security, application security, recovery in case of an incident, incident response, vulnerability management, encryption (cryptography). ...

Sandbox – a dedicated environment for the secure execution of programs This is a secure testing environment. The solution isolates untested code changes and experiments from the production environment and repository in the context of software development. Including web development and version ...

Modern malware is very “quiet” when it enters the network. Malware uses a number of evasive methods to remain undetected by cybersecurity tools. Evasion techniques have become an important part of malware, so it’s important to know about effective countermeasures. In this ...