Posts

Name Your Poison

Image
Cache me in So we all know how caching works, right? Let’s have a quick overview to be sure. Caching uses a high-speed data storage layer to store a subset of transient web data so future requests for the same data serve up fast, without the need to access the data’s primary storage location. Cached data usually holes up in fast-access hardware like RAM (Random-access memory), the primary purpose being to increase the speed of data retrieval by reducing the need to access the underlying slower storage layer. Many businesses and organizations host their own cache using software like Varnish, while others opt for Content Delivery Networks (CDN) like Cloudflare that scatter cache across distributed geographic locations. Then there are content management applications like Drupal with built-in cache. Lots of permutations, the same purpose: boosting performance on both the server and client sides. Know Your Poison Ok, so now we know how caching works, but what is cache poisoning?

A Slice of the Action: 5G network slicing and the implications for your business

Image
Seems like everyone is scrambling to prepare for the arrival of the first commercial 5G networks, supposedly sometime this year. Don’t panic if you're one of the many nodding your head during 5G slicing conversations, pretending you know all about it. We know, it’s a lot. We’re going to drill down and see why it’s the ‘it’ topic, and figure out the right moves to ensure that your virtualized infrastructure is sitting pretty. So, what is 5G and why am I slicing it? Simply put, 5G networks are the next generation of mobile internet connectivity. Faster speeds, more reliable connections, low latency, more bandwidth, and denser network coverage are just a few of the potent 5G features with obvious benefits for IoT applications. All good so far, but why slice it? 5G network slicing allows the multiplexing of virtualized and independent logical networks on the same physical network infrastructure. Each slice is an isolated, end-to-end network tailored to meet the diverse nee

Bug Bytes: Narrate your own BugReplay report

Image
Ever find yourself recording a bug report for your developers or IT department and wish you could add notes or simply talk them through the issue? Ever find that the visual walkthrough alone doesn’t quite communicate the problem to the fullest extent?  We know your pain and we’ve done something cool to eliminate it. Introducing the new BugReplay bug report narration feature! One simple mouse-click lets you enable audio mic recording to create a voiceover to accompany your bug report.  Communicate your difficulties in real-time, without the need for additional files, lengthy emails back and forth, in-app chats, etc. You can explain the problem and how it affects your experience of the app/site, and what you want developers/IT pros to address to make your life easier. Nothing lost in translation, no misconceptions, no running down the wrong track, no barking up the wrong tree, you get the idea. Time saved. The right people can quickly ascertain the issue and make

New Feature Announcement: It's all in the Timing

Image
Regardless of industry or niche, every business wants their website or blog to deliver a great user experience. No matter how wonderful your offering, visitor experience on your site depends on how fast your content displays. Waiting leads to frustration; frustration leads to visitors up and leaving with the likelihood that they won’t come back. The reality is that the preponderance of visitors take less than the blink of an eye to decide if your site is wasting valuable time. That’s it! You have 400 msec to get that content up before they’re off to find your competitor.  As buying behavior on the web evolves, you can’t afford to overlook the importance of page load rates. Don’t panic! BugReplay saves the day by making identifying and alleviating lag quick and easy. Our new Resource Timing with Video Sync feature is your microscope for examining website performance in real-time. Select the Network Traffic option from your BugReplay dashboard to view site performance metr

Philosophy of Mr. Robot, 101

Image
Control is about as real as a one-legged unicorn taking a leak at the end of a double rainbow.  The sage words of one Elliot Alderson, aka Mr. Robot. Of course, he also said “control can sometimes be an illusion. But sometimes you need illusion to gain control”. Control, therefore, or the semblance of control, is key to preventing and fighting a cyber-onslaught. Mr. Alderson has much wisdom to impart to us on this topic. Together, let’s take a brief Fsociety University ‘Wresting back Control’ class to gain a better understanding of these insights.  Module 1: Recognizing the dangers of the insider With enough time, a hacker will find the flaws and there is no one with more time to uncover these flaws than someone already on the inside, just ask Elliot Alderson. Most organizations still focus on developing safeguards against external online attacks, using defensive tools like anti-malware, external firewalls, DDoS attack mitigation, external data loss prevention, etc. It’s a fr

Is paying a ransomware demand ever the right thing to do?

Image
Conventional wisdom, not to mention Hollywood wisdom, tells us that paying the kidnapper is always a mistake (think The Big Lebowski or Fargo!). Our parents warned us to stand up to bullies right? Successful poker players know how to tough out the dead man’s hand, and even the smallest dog on the street knows to bark like hell when faced with a threat. We know all this and yet we see a distinct rise in the number of businesses willing to pay ransomware attackers. What the?? Ransomware isn't new but it is on trend. Specialist attackers deploying ransomware don't destroy our data, they hold it hostage, making it inaccessible without the intervention of the attackers complex numeric key. This key usually comes at a premium, if it comes at all. Many have paid out for nothing: no return of their data. A gratuitous, sinister abduction, just because they can. With attacks becoming more wily, more intractable, perhaps it is not surprising that many surrender to the onslaught. Gre

Show You Mine If You Show Me Yours: The role of threat information exchange in strengthening cyber-defenses

Sharing is Caring Speed and efficiency are essential to success in the digital economy. Businesses and organizations with an online presence need accurate, stealthy cybersecurity measures to counter the myriad of threats aimed at them. Working in isolation to tackle these attacks and shore-up cyber defenses is a costly and often futile exercise. As Grayson Milbourne, Security Intelligence Director at cybersecurity firm Webroot puts it: Today’s cyber threat landscape is polymorphic in nature — constantly changing and making it nearly impossible to detect with traditional security approaches.  For this reason, many businesses are coming to the realization that a collective offensive may be the best defense. Sharing threat information across public and private industries and organizations could reduce cybersecurity workloads and provide access to a wide pool of security resources, something smaller companies, in particular, are latching on to.  In a recent study of 200 US IT secur