Achieve security excellence without breaking the budget!

Download guide

Guest Post

how to improve ecommerce security and reduce operational costs
Guest Post

How to Improve Ecommerce Security and Reduce Operational Costs

In this article, we explore methods on how to improve ecommerce security, combat bots, block bad traffic, and cut your overall operational costs.

Building a Network for Small Businesses Part 3: Attack Scenarios
Guest Post

Building a Network for Small Businesses Part 3: Attack Scenarios

In part 3 of this series, Péter walks you through implementing and testing attack scenarios to protect networks for small businesses.

Building a Network for Small Businesses Part 2: Running Configurations
Guest Post

Building a Network for Small Businesses Part 2: Running Configurations

In part 2 of this series, Peter dives into running configurations on the firewall, with explanations of the design decisions made for each service.

Building a Network for Small Businesses Part 1: Hardware
Guest Post

Building a Network for Small Businesses Part 1: Hardware

Learn how to build, test, and secure networks with CrowdSec for small businesses to achieve a more affordable firewall and router combination.

Using CrowdSec to Block Unwanted Outbound Behavior
Guest Post

Using CrowdSec to Block Unwanted Outbound Behavior

CrowdSec Ambassador Viktoria Rei Bauer, shares her story on testing CrowdSec as a way to block unwanted outbound behavior.

Saving Resources with CrowdSec
Guest Post

Saving Resources with CrowdSec

CrowdSec is not just about security. As it turns out, if you’re able to block attacks so your server doesn’t have to deal with them, you’ll also save CPU as this article will show you.

How to Navigate in Cybersecurity Acronyms
Guest Post

How to Navigate in Cybersecurity Acronyms

Cyber security is the land of TLA (Three Letter Acronyms…get it? we are very meta here…). The complete value chain has dozens of acronyms from SOC to SIEM through DDoS, CTI etc. For the uninitiated, all these words sound like invoking millenary monsters from a Lovecraft novel. We could spend hours explaining those terms, but […]

Collaboration is the Key in cybersecurity
Guest Post

Collaboration is the Key in cybersecurity

The information security industry is obviously part of the IT sector, but security companies are different from traditional software companies in many ways. If your company builds cloud services or CRM systems or search engines, you don’t have an enemy. The closest thing to an enemy would be competing companies. However, infosec companies do have […]