Loading...

A well rounded team of superstars will often still have areas of weakness or improvement. In the same vein, advisers play a big role in filling in holes or strengthening areas of weakness for an ICO team. Whether it be an expert in a certain field, or their long history of success and experience, these all become valuable resources for an ICO.

Having a strong experienced board of advisers allows an ICO to use the experience and expertise of these board members in order to advance and grow in the right direction. Knowing that you are backed by veterans who believe in your vision can help boost overall morale and success too.

Here is a feature spotlight on some of Cloudbric’s advisers!

A Global Top 10 Cyber Security Expert, Jae-Woo Lee

Dr. Jae-Woo Lee is a Chair Professor at Dongguk University, in the Graduate School of International Affairs & Information Security (IAIS), and has been so for the past 20 years. He is presently the manager of the blockchain research laboratories at the school. He is also the Chair of the ISC2 Asia Pacific Advisory Council, the Chairperson of the Advisory Board of CISO Association in Seoul and Cyber Forensic Professional Association, and was the Vice President of CISA for a couple of years.

Dr. Lee has served in numerous leadership and advisory capacities within the cybersecurity field. He was the first president of the Korea Information Security Agency, a board member of the Korean Governmental Security Committee, a Chairperson of the National Information System Security & Audit Committee, a member of the office of Supreme Public Prosecutor’s cyber advisory board, and a member of the Ministry of National Defense Advisory Board.

Dr. Lee was also selected as a top IT security expert for Kaspersky Lab’s International Advisory Board which was composed of 10 world-known cybersecurity experts. He has received 4 major medals and Presidential awards from the Korean Government and the Legion of Merit Medal from the U.S.A.

For instance, Dr. Lee received the “2014 Cyber Security Grand Prix Award” from the Korean Government and has also received the Harold F. Tipton Award from (ISC)2 and Harold Weiss Award from ISACA. Dr. Lee has written and published several cybersecurity books.

A Pioneer of Cyber Security in South Korea, Seokwoo Lee

Seokwoo is the CEO and Founder of Penta Security Systems, Inc. Seokwoo always dreamed of creating his own company and 20 years later he was able to achieve that very dream.

Penta Security Systems is one of the biggest cybersecurity vendors in the APAC region(in terms of market share) and the biggest in South Korea. In 2016, Frost & Sullivan selected Penta Security Systems as the Asian Cyber Security Vendor of the Year.

Penta Security Systems is well known for its numerous award winning security solutions ranging from web application security, database security, and public key infrastructure (PKI) security. Penta Security Systems now has more than 3,000 installed customers in government, enterprises, SMBs, education, and finance. Penta Security Systems continues to innovate and grow into new industries like smart factory security and connected car security.

Seokwoo was awarded by (ISC)²® with the Information Security Leadership Achievements award and is also the Co-Founder of XBrain, a machine learning company.

He continues to give back to the community that nurtured his growth by serving as an adjunct professor at POSTECH, his alma mater. He has also been the POSTECH Alumnus Chairman, and the POSTECH School Corporation Director and the APGC (Association of POSTECH Grown Companies) Founding Chairman.

An ICO, Tech, and Cybersecurity Mogul, Dennis Kim

Dennis Kim is an avid programmer and a security expert. He has always had an interest in mobile games and game portals, as well as security revolving around the ever-changing platforms and infrastructures for games. He is the CEO of PLAYCOIN, an immensely successful Blockchain Based Game Platform ICO and the CEO of GameHub Corporation Limited.

He also serves in many other roles that allows him to exercise his strong technical background. He is the CTO of MakeUs, the brain behind the digital content brand Dingo which generates 1.5 billion views per month. Dennis is also the CTO of LivePlex and also the PM for the Golf-Zone Game Portal, and for Nike:Run the City.

Dennis also shares his security expertise as a KISA (Korea Internet & Security Agency) Cloud Security Advisor. He has also been a host of the Podcast “I’m a Programmer”. He also serves as an interpreter for ZDnet and IT Chosun.

Other interests of Dennis includes social hacking, machine learning, and all things cloud related.

To learn more about Cloudbric’s Reverse ICO you can find us on our official ICO website, LinkedIn, Twitter, and Facebook. If you have any questions or would just like to talk to our team in real time come visit our Telegram channel!

The post A Strong Advisory Board, A Strong ICO appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

[Credit: bitcoinmagazine.com]

With the boom of blockchain technology integration and new ICOs appearing on a daily basis, many people are now familiar with the term “ICO” or “Initial Coin Offering”.

However, there is a trendy new term called “reverse ICO” that is making its way around the crypto circuit. Some may have heard of it, others may have not. What is the difference between the two, and how do they affect existing customers and users?

Established Company + ICO = Reverse ICO

Reverse ICOs and traditional ICOs are similar in the sense that both offer coins as incentives for the use of, or contribution to a service.

The difference stems from the fact that companies participating in reverse ICOs are already established companies.

This means that they have an existing business, a solid track record of revenue, and, most importantly, a working product/solution out in the market.

Simply put, companies engaging in reverse ICOs, such as Cloudbric, are expanding their existing services by utilizing blockchain technology. This allows the businesses help decentralize information to the masses and offer up new and exciting forms of technology that can disrupt an entire market.

Why Does an Existing Company Choose to do an ICO?

A person may ask why these companies are doing an ICO if they are already established in their respective markets. The answer varies on a company to company, and can be more than just a simple answer.

The most common and primary reason an existing company would decide to do a reverse ICO is for business expansion purposes. In Cloudbric’s case, the team is looking to provide a new line of cybersecurity solutions that can be made accessible to anyone with a mobile device.

Furthermore, decentralizing threat intelligence and utilizing blockchain technology will be the future of cybersecurity. Previously, only enterprise security vendors would have access to new and emerging cyber attack information.

Cloudbric works to bring cyber threat data into hands of everyday users to empower the security community as a whole, which could potentially drive further innovation and awareness.

What About Existing Customers and Users of a Reverse ICO?

What does this mean for existing customers and users? Do they have anything they should worry about?

Existing customers and users of a reverse ICO solution will benefit from increased value proposition. Users will now have access to existing services, as well as any new services leveraging the blockchain to help promote the next evolution of cybersecurity.

Cloudbric’s existing customers will be able to benefit by being able to use Cloudbric’s upcoming and existing services for free for personal use and be part of a decentralized community in which all threat data will be shared.

Customers will also be able to participate in this new concept and be rewarded through Cloudbric’s Security Rewards System for contributing security threat intelligence data to Cloudbric.

Food for Thought About ICOs and Reverse ICOs

In summary, traditional ICOs require investors to contribute funds towards the potential of certain ideas and concepts. However, reverse ICOs work in the opposite manner.

In a reverse ICO, the company offering a new cryptocurrenct token is an established company with a working business model and is generating revenue. This makes performing due diligence a lot easier for prospective investors.

In a time where ICOs are being created everyday the need to discern a real ICO to a scam ICO is becoming more and more important. Reverse ICO helps alleviate some of this concern as it allows investors and users to see real people, with a real business, with a real passion and vision for what they do!

To learn more about Cloudbric’s Reverse ICO you can find us on our official ICO websiteLinkedInTwitter, and Facebook. If you have any questions or would just like to talk to our team in real time come visit our Telegram channel!

The post What is a Reverse ICO? Reverse ICO vs. Traditional ICO appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

When it comes to ICOs, people often become preoccupied with what the ICO is about and what features it can (potentially) offer. However, many tend to overlook who the actual founders of an ICO, which is a critical piece of the puzzle.

Cloudbric would like to officially introduce the C-level team of the reverse ICO concept. Learning more about each founding member’s backgrounds, accomplishments, and hobbies can be invaluable and help users connect better with the team.

Cloudbric ICO’s CEO, Co-Founder, and Othello Expert

[▲TJ Jung, CEO of Cloudbric]

TJ Jung is the CEO and Co-Founder of Cloudbric. One of TJ’s biggest passions lies in computer technology and information security. To give you an overview, he started off his career in IT security as an associate in 2009 at Penta Security Systems, Inc.

During his time at Penta Security, TJ was credited as the inventor of various IT security related patents, such as specialized data security methods, generation and verification of alternative data in a specified format, etc. He also eventually made his way to becoming the VP of Product & Technology for multiple award winning security solutions at Penta Security.

By 2017, he became the CEO of Cloudbric Corporation (which started as an in-house venture of Penta Security Systems), as well as the Cloudbric reverse ICO venture.

[▲TJ against Ben Seeley (left) during the World Othello Championship in 2003 Stockholm, Sweden]

In terms of his personal hobbies, TJ is a major Othello fan, which is a strategy board game that’s played around the world. He once served as the VP of the Korea Othello Association and also ranked 8th in the World Othello Championship in 2003. He is still as passionate of a player today as he was back then.

He’s also an avid and competitive salsa dancer, which tends to always catch people by surprise. Next time, if you’re in need of a dance buddy, TJ is certainly the man to call!

CTO, Co-Founder, and R&B Enthusiast

[▲DS Kim, Co-Founder and CTO of Cloudbric]

Next up is the CTO of Cloudbric’s reverse ICO, DS Kim. DS brings a wealth of information security knowledge and expertise spanning over 20 years in the field.

DS is also a man that likes to stay busy. He also serves as the CSO of Penta Security Systems, Inc., Chief Director of the POSTECH Startup Incubator called APGC-Lab, and CTO of the AMO Foundation. DS was also the Co-Founder of XBrain and now supports it as an adviser. Sometimes, there just doesn’t seem to be enough hours in the day to fill his curiosity and work ethic!

[▲Tea time with DS]

As you can see from his various business titles and roles in multiple organizations, relieving stress is also vital component of his life. One of his favorite stress relievers is listening to and singing R&B music. In another lifetime, his biggest dream will be to try out for American Idol as an accomplished R&B singer.

Head of Blockchain Development, and Dog Lover

[▲Min Woo Nam, Head of Blockchain & Security Development]

Min Woo Nam is the head of blockchain development & security development for Cloudbric and brings over 18 years of cryptographic software development and IT experience to the team.

He’s kind of the wunderkind of the Cloudbric team as he’s the team’s leading developer and security expert. Min Woo gained industry wide recognition as the creator of some of the best selling data security products (focusing on PKI and SSO) in the entire South Korean market.

Those close to Min Woo knows that his skills have no limits. If you ask him any technology related question or request, his answers usually seem to be along the lines of, “tell me what you need, and it’s done.”

[▲Min Woo and Muji enjoying a bike ride]

Cocky or confident? No matter the semantics, Cloudbric values his experience, talent, and willingness to make Cloudbric a high performance ICO solution.

However, Min Woo is not just a talented developer. There is also a much softer (perhaps, fluffier?) side of Min Woo. He is a mega dog lover! As you can see in the picture above, he usually spends his free time devoting his love and attention to his Bichon Frise named Muji.

What the Three IT Security Experts Have in Common

[▲The Execs enjoying a company outing at Yeouido Park]

Not many would agree that an Othello master, R&B enthusiast, and a dog lover would make a great team. However, all three together bring a special level of competition, passion, and natural born talent into the same room. More importantly, they all share the goal of making Cloudbric a market disrupting solution in the ICO space.

To learn more about Cloudbric’s Reverse ICO you can find us on our official ICO websiteLinkedInTwitter, and Facebook. If you have any questions or would just like to talk to our team in real time come visit our Telegram channel!

The post Meet the Leaders Behind Cloudbric’s Reverse ICO appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

When it comes to ICOs, people often become preoccupied with what the ICO is about and what features it can (potentially) offer. However, many tend to overlook who the actual founders of an ICO, which is a critical piece of the puzzle.

Cloudbric would like to officially introduce the C-level team of the reverse ICO concept. Learning more about each founding member’s backgrounds, accomplishments, and hobbies can be invaluable and help users connect better with the team.

Cloudbric ICO’s CEO, Co-Founder, and Othello Expert

[TJ Jung, CEO of Cloudbric]

TJ Jung is the CEO and Co-Founder of Cloudbric. One of TJ’s biggest passions lies in computer technology and information security. To give you an overview, he started off his career in IT security as an associate in 2009 at Penta Security Systems, Inc.

During his time at Penta Security, TJ was credited as the inventor of various IT security related patents, such as specialized data security methods, generation and verification of alternative data in a specified format, etc. He also eventually made his way to becoming the VP of Product & Technology for multiple award winning security solutions at Penta Security.

By 2017, he became the CEO of Cloudbric Corporation (which started as an in-house venture of Penta Security Systems), as well as the Cloudbric reverse ICO venture.

[TJ against Ben Seeley (left) during the World Othello Championship in 2003 Stockholm, Sweden]

In terms of his personal hobbies, TJ is a major Othello fan, which is a strategy board game that’s played around the world. He once served as the VP of the Korea Othello Association and also ranked 8th in the World Othello Championship in 2003. He is still as passionate of a player today as he was back then.

He’s also an avid and competitive salsa dancer, which tends to always catch people by surprise. Next time, if you’re in need of a dance buddy, TJ is certainly the man to call!

CTO, Co-Founder, and R&B Enthusiast

[DS Kim, Co-Founder and CTO of Cloudbric]

Next up is the CTO of Cloudbric’s reverse ICO, DS Kim. DS brings a wealth of information security knowledge and expertise spanning over 20 years in the field.

DS is also a man that likes to stay busy. He also serves as the CSO of Penta Security Systems, Inc., Chief Director of the POSTECH Startup Incubator called APGC-Lab, and CTO of the AMO Foundation. DS was also the Co-Founder of XBrain and now supports it as an adviser. Sometimes, there just doesn’t seem to be enough hours in the day to fill his curiosity and work ethic!

[Tea time with DS]

As you can see from his various business titles and roles in multiple organizations, relieving stress is also vital component of his life. One of his favorite stress relievers is listening to and singing R&B music. In another lifetime, his biggest dream will be to try out for American Idol as an accomplished R&B singer.

Head of Blockchain Development, and Dog Lover

[Min Woo Nam, Head of Blockchain & Security Development]

Min Woo Nam is the head of blockchain development & security development for Cloudbric and brings over 18 years of cryptographic software development and IT experience to the team.

He’s kind of the wunderkind of the Cloudbric team as he’s the team’s leading developer and security expert. Min Woo gained industry wide recognition as the creator of some of the best selling data security products (focusing on PKI and SSO) in the entire South Korean market.

Those close to Min Woo knows that his skills have no limits. If you ask him any technology related question or request, his answers usually seem to be along the lines of, “tell me what you need, and it’s done.”

[Min Woo and Muji enjoying a bike ride]

Cocky or confident? No matter the semantics, Cloudbric values his experience, talent, and willingness to make Cloudbric a high performance ICO solution.

However, Min Woo is not just a talented developer. There is also a much softer (perhaps, fluffier?) side of Min Woo. He is a mega dog lover! As you can see in the picture above, he usually spends his free time devoting his love and attention to his Bichon Frise named Muji.

What the Three IT Security Experts Have in Common

[The Execs enjoying a company outing at Yeouido Park]

Not many would agree that an Othello master, R&B enthusiast, and a dog lover would make a great team. However, all three together bring a special level of competition, passion, and natural born talent into the same room. More importantly, they all share the goal of making Cloudbric a market disrupting solution in the ICO space.

To learn more about Cloudbric’s Reverse ICO you can find us on our official ICO website, LinkedIn, Twitter, and Facebook. If you have any questions or would just like to talk to our team in real time come visit our Telegram channel!

The post Meet the Leaders Behind Cloudbric’s Reverse ICO appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Cloudbric’s Decentralized Universal Security Platform

The Cloudbric team is proud to announce that it will officially undergo a reverse ICO event! For more information regarding the ICO, such as the upcoming token sale event and whitepaper overview, please visit the Cloudbric ICO homepage. Additionally, you may reach out to the Cloudbric ICO team directly via the CLB Telegram Channel for any real time questions and support.

What is a Reverse ICO?

By now, many of you have heard of the term ‘ICO’ being thrown around quite a bit. ICO or Initial Coin Offering are crowdfunding events that allows a company to sell their respective cryptocurrency token prior to it hitting the open market or exchange. Organizations that host ICO events are typically new companies with concepts that sometimes lack fully functioning technologies or solutions.

However, a reverse ICO works in the opposite way. These sales events are usually reserved for companies that already have pre-existing solutions, customers, recurring revenue, etc., but are looking to utilize the power of the blockchain. Cloudbric hopes to enter this space by creating a new universal security platform and decentralizing cyber threat information across the blockchain.

Introducing the Universal Security Platform

Cloudbric’s Universal Security Platform Solutions

As many of you know, Cloudbric is an award winning web application security vendor that offers an impressive array of website security features for free. However, Cloudbric will look to expand its current servicing capabilities through the development of a new universal security platform to help protect a wider range of users in need of security.

To get things started, the upgraded Cloudbric security platform will be comprised of three (3) main cybersecurity components: web security, mobile/PC device security, and security research tools. This provides users an opportunity to pick and choose multiple cybersecurity solutions that best fits their needs in an all-in-one security platform. By utilizing a unified platform with a diverse suite of security services, users will be able to enjoy a more streamlined experience and become part of the growing Cloudbric ecosystem.

Additionally, cyber attack information will be made accessible through the blockchain and will serve as a valuable resource for the security community. Malicious cyber threat data detected and filtered by Cloudbric will be provided to all users via interactive tools found on Cloudbric Labs. Public users will be able to access this information to help promote a more secure and trusted online society.

Revamped Security Technology

At the heart of the newly upgraded Cloudbric web security solution will be a self-developed artificial intelligence based deep learning engine. What this means for you is that Cloudbric will soon deploy one of the most accurate and advanced security technologies on the market. Increased performance and intelligence of the deep learning engine will also be bolstered by the very users that use the technology to protect their online data.

Without being too technical, AI based systems primarily gain knowledge and strength through the constant feeding of data into the AI detection engine itself. This allows the engine to learn and recognize certain patterns and behaviors on its own. Over time, AI systems can grow significantly in overall intelligence and accuracy.

Cloudbric’s planned integration of its in-house deep learning module will enable users who utilize its web security solutions to automatically feed anonymous cyber attack logs/data directly back into Cloudbric. This will help the deep learning engine better recognize cyber attack symptoms, patterns, behaviors, etc., which will ultimately provide increased security intelligence to all users. A true win-win situation for everyone!

Important Features to Know

Introducing the CLB Token Ecosystem

One of the most exciting concepts of the reverse ICO is the introduction of Cloudbric’s cryptocurrency tokens known as CLB. Users that utilize any of Cloudbric’s security services or contribute to the Cloudbric Labs resource community will automatically receive free CLB distributions as part of the Cloudbric Security Rewards Program.

The primary purpose of this program is to motivate general users to fully embrace the widespread adoption of cybersecurity. For instance, if users sign up for Cloudbric’s web security servicing and wish to contribute to the growth of the deep learning security technology, then Cloudbric will provide free recurring CLB token distributions as a “thank you” for helping to improve the overall security community. Users who wish to utilize mobile/PC device protection services or contribute threat intelligence information towards Cloudbric Labs can also earn CLB rewards.

The best part of free CLB distributions will be the utilization of these tokens. Cloudbric’s CLB tokens will look for official listing on several cryptocurrency exchanges in the near future. Users can transfer their tokens to these applicable exchanges to turn their CLB to BTC, ETH, or other alternative cryptocurrencies available within the exchange. Likewise, users can utilize CLB tokens for exclusive discounts and offers provided by Cloudbric partners that are part of the Cloudbric Secure Web Alliance network.

Decentralization of Threat Information

Cyber Threat Information Decentralized

Recently, the promise of incorporating blockchain technology across various industries is all the rage. Many are now starting to see the massive market disrupting potential of decentralizing and verifying information on the blockchain. Cloudbric hopes to be part of this revolution and spearhead much needed change in the cybersecurity market.

There are several major issues present in the market today; however, one of the biggest and most visible problems is the privatization of cyber threat information. To be more specific, enterprise security providers collect large amounts of valuable threat information from their customers (i.e. recording of vulnerabilities, hacking patterns, malicious IPs, malware file recognition, etc.), but they choose to keep this information private for their own self gain. This enables enterprise vendors to continue profiting off of their customers through the development of new security products, software updates, or the sale of industry threat reports.

Cloudbric hopes to end the monopolization of threat data by enterprise security vendors and make this information open and accessible to all users. All threat intelligence information gathered by Cloudbric’s universal security platform will be recorded on the blockchain, so that this can ultimately become public information.

Cloudbric will also present this data in the form of interactive tools and resources that will be part of Cloudbric Labs. A beta version of Cloudbric Labs is already active and features three security resource tools (i.e. BlackIPedia, WAFER, and Threat Index) that are free to use. Cloudbric users will play an integral role in the overall expansion of Cloudbric Labs, as well as making cyber attack information available to the masses.

 
 

To learn more about Cloudbric’s Reverse ICO you can find us on our official ICO website, LinkedIn, Twitter, and Facebook. If you have any questions or would just like to talk to our team in real time come visit our Telegram channel!

The post Cloudbric Reverse ICO: What You Need to Know appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Cloudbric was named a Silver Stevie® Award winner for the category of Innovation in Technology Development at the fifth annual Asia-Pacific Stevie Awards.

Nicknamed the “Stevies” in reference to the Greek word for “crowned,” Stevie Awards are widely considered to be premier global business awards, conferring recognition for achievement through programs like The International Business Awards® for sixteen years. Since its conception in 2014, the Asia-Pacific Stevie Awards is the only business awards program to recognize innovation in the workplace in all 22 nations of the Asia-Pacific region.

For this year’s Asia-Pacific Stevie Awards, the Gold, Silver and Bronze nominations were judged for their excellence in achievements of various categories by more than one hundred executives around the world.

Awarded Silver place, Cloudbric was recognized for its achievements in innovative technology development in 2017. They specifically commended Cloudbric for offering free SSL services with features like automatic renewals so that users no don’t need to worry about certificate management. Cloudbric makes it possible for even those with little background knowledge in security to utilize its website security services with ease.

Visit http://asia.stevieawards.com/2018-stevie-winners for the complete list of winners.

More About The Stevie® Awards
Stevie Awards are conferred in seven programs: the Asia-Pacific Stevie Awards, the German Stevie Awards, The American Business Awards, The International Business Awards®, the Stevie Awards for Women in Business, the Stevie Awards for Great Employers, and the Stevie Awards for Sales & Customer Service. Stevie Awards competitions receive more than 10,000 entries each year from organizations in more than 60 nations. Honoring organizations of all types and sizes and the people behind them, the Stevies recognize outstanding performances in the workplace worldwide. Learn more about the Stevie Awards at http://www.StevieAwards.com.

The post Cloudbric Wins Silver At 2018 Stevie Awards appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The Cloudbric team is proud to announce the launch of its reverse ICO project!

Serving users globally with our suite of web security services, we’re excited to tap into the power of blockchain and expand our services offerings worldwide with a decentralized universal security platform.

So what is our project about?

In essence, Cloudbric will become a decentralized security platform that provides a diverse suite of security services for free (non-commercial usage).

We understand that not everyone fully grasps the idea of a reverse ICO or ICO, so we’re rebranding our Medium blog to address all the burning questions that potential participants may have.

Finally, we’re also opening a plethora of communication channels for you to stay updated about our latest news and even chat with our team in real time. So, don’t shy away—  join the conversation today!

For more information regarding the ICO, such as the upcoming token sale event and whitepaper concept overview, please visit the Cloudbric ICO homepage.

Any other inquiries should be directed to ico@cloudbric.com.

The post Cloudbric Launches Reverse ICO Project appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Interested in becoming your own web security expert? Now you can! Cloudbric first introduced Cloudbric Labs last November as a collection of free security tools for the cybersecurity community.

This is why the resources are available to anyone and everyone, easy to utilize, and free of charge. Currently, Cloudbric Labs consists of three distinct services and tools: BlackIPedia, Threat Index, and WAFER.

In this blog post, we will show you how to get the most out of these free security tools.

BlackIPedia What Is It?

In a nutshell, BlackIPedia is an IP reputation service that allows users to check IP threat levels, with the term “black” being synonymous with “malicious.” Cloudbric Labs assigns a numerical value (or threat level) — on a scale from 1 to 100 — to an IP address based on the type and range of web attacks originating from it and frequency. The lower the number, the less of a threat it poses.  For reference, an IP address with a threat of 70 or higher would be considered malicious.

Who’s It For?

As previously mentioned, the service is available to everyone, including users who are not currently protected by Cloudbric’s website security services. BlackIPedia is designed to be useful to website owners and developers who want to prevent cyberattacks. Cloudbric Labs provides BlackIPedia API documentation so that the data can be integrated into end-users’ own security platforms, and thus allow website owners to take preemptive action in blocking malicious IPs from accessing their site.  

How Do You Use It?

Simply input a valid IP address in the search bar to generate a security report that details web attack history, current threat level, country of origin, and more.

Take a look at a report sample below (click to enlarge).

Users can also look at the top 100 blacklisted IPs by date.

Threat Index What Is It?

Cloudbric Labs’ Threat Index is a database of web vulnerabilities, consisting of a comprehensive list of unique vulnerability strains that are associated with some of the web’s most common attacks like SQL injection.

Who’s It For?

The Threat Index is available for reference to people that are interested in reviewing the different kinds of threats on the web. From cybersecurity fans to Cloudbric users, anyone interested to find out what type of web vulnerabilities have been detected and blocked by Cloudbric’s WAF can do so via the Threat Index. The Cloudbric Labs’ team rates each web vulnerability from Low to Critical, depending on their potential impact for damage on major platforms.

How Do You Use It?

You can browse through analyzed reports of the most recent vulnerabilities by searching a keyword or phrase, like XSS and SQL Injection, or a simple description of the threat’s general characteristics in the search bar. Alternatively, you can also view a general list of the recent web vulnerabilities by the date they were updated with new information. This is different from the published date, which derives from the date it was crawled by our team in its original source.  

See an example of a web vulnerability report below!

 WAFER What Is It?

WAFER is a WAF evaluator that tests the performance and detection abilities of the most popular WAFs in the market by focusing primarily on the percentage of false positives and false negatives.

When it comes to testing the accuracy of security services like cloud-based WAFs, calculating false positives and false negatives are an objective method to measure a WAF’s detection capabilities.

Who’s It For?

Not all WAFs are created equal, and difference in performance and accuracy is to be expected. WAFER is recommended for website owners, administrators, and developers who seek to optimize their web security (or that of their customers) by testing out different WAFs to find the one best suited for their security needs and budget.  Anyone can utilize WAFER to check whether their current WAF is doing an adequate job of protecting their websites.

How Do You Use It?

To test the performance of a WAF, website owners are asked to enter their domain and choose the WAF they are currently using or interested in testing. Akamai, Cloudflare, F5, Sucuri, Wordfence, and Fortinet are just some of the WAF options. Users are then asked to verify ownership of the domain by (1) simply signing into their Cloudbric account, (2) changing their domain’s DNS record, or (3) by adding a meta tag to their HTML code on their website.

WAFER evaluates performance by sending a test traffic to the site; Cloudbric Labs uses Exploit DB* and attack patterns to conduct this test, and upon test completion, a downloadable evaluation report is provided. In this summary report, a letter grade from A to D is assigned (A  noting the highest accuracy) to both the WAF’s detection and distinguishing abilities.

See an example of the evaluation report below.

Even if you do not currently own a website, you can still make use of these security tools.

We have other resources available for you to reference without having your own site to test, like a case study that highlights the performance test results of Cloudbric’s WAF in comparison to another vendor’s WAF. Click here to read the full report.

Head over to labs.cloudbric.com now to get access to the free security tools!

Notes:
*Exploit DB* patterns are obtained from a comprehensive database of exploit codes maintained by Offensive Security, a respected and well-established information security training company. They also provide various information security certifications as well as premium penetration testing services.
 

The post Introduction to Cloudbric Labs: The Ultimate Guide to Using Our Free Security Tools appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

World Backup Day is celebrated on March 31 to raise awareness about backups and data preservation. What started off as a humorous homage to April Fool’s Day has now become a day to remind individuals to back up their most treasured files. While it’s easy to advocate the need to perform regular data backups for individuals, the task may be a bit more complicated for website owners and businesses. Below are five tips and reminders for small businesses:

1. Back Up Three Ways

Any business that collects data must properly manage and protect it. Many security experts recommend backing up data three ways: internally, externally, and remotely. Backing up internally means that data backups are contained within the organization’s own servers, while backing up externally means external or removable hard drives are used to back up data. Finally, backing up remotely refers to cloud storage, a growing and popular alternative. Each has its limitations and perks to boast, but small businesses should keep note that solely relying on one method of backup is a recipe for disaster.

2. Consider Investing In Deduplication

What does deduplication mean in relation to data backups? Backing up your data always involves some kind of storage component. Data deduplication is an important technology that allows for the elimination of redundant data. This is a must for those small businesses who are collecting massive amounts of valuable data and are need of a cost-effective solution. Let’s say you want to back up important business emails, but 500 of those emails contain the same large file attachment. Rather than backing up all 500 versions of the same file and wasting space on storage, only one file is actually stored and backed up with data deduplication.

3. Protect Your Data With Encryption

Whenever and wherever you have data stored (including your backups), it should be protected. One way to do this is through encryption. This ensures that even if a hacker breaks into your computer systems and is able to locate your most valuable information, the data will be of no use without the proper key to decrypt said data. Keep your databases secure with private key encryption so that your organization is in control of key management, minimizing the risk of private keys falling into the wrong hands.

4. Know That Not All Data Can Be Backed Up The Same Way

Not all types of data can be stored or protected the same way. The same goes for backing up your data. In some instances, certain file types may be excluded from your backup, especially when it’s done online. System, temporary, exchange, and virtual machine files are just some of those kind of files that may be excluded. For this reason, backing up certain kinds of data requires careful planning on the side of your IT management team. Make sure you do your homework and research backup solutions that cater to your organization’s needs.

5. Expect Data Recovery To Take Some Time

No matter how resilient and well-protected you assume your servers to be, they can crash unexpectedly. It is times like these that you’ll need to ready yourself with data recovery options. Data recovery depends on a number of factors, so it is difficult to gauge the recovery period and whether you can recover the data in full. Depending on the data recovery service, you may be able to retrieve your data in as little as one to two days. In some cases, however, the entire process from diagnosis to delivery may take weeks. To best prepare yourself for minimal data loss, it’s important to back up your data regularly.  

Data backups are not often prioritized and put in the back burner, which is why World Backup Day serves as a great reminder for the smaller businesses who may not be implementing the best practices in backing up. For more tips visit the official World Backup Day website and gain access to their resources. We also recommend taking the World Backup Day pledge by signing in to your social media accounts and pledging on Facebook or Twitter!

The post World Backup Day: Tips For Small Businesses appeared first on Cloudbric.

Read Full Article
Visit website
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The popularity of cryptocurrency is at an all-time high. However, many are jumping onto the bandwagon without understanding how it works. While the inventor of Bitcoin, Satoshi Nakamoto, never intended to invent a currency, what we know is that cryptocurrency emerged as a byproduct of the Blockchain technology. The decentralized nature of it has become an inciting idea to many. Furthermore, as the value of some of the biggest cryptocurrencies rise (e.g., Bitcoin is currently valued at approximately $9,100), many are scrounging to invest in cryptocurrency. It’s to no surprise that many hackers and cryptocurrency enthusiasts are finding creative ways to “mine” for cryptocurrency. Here are some of the known methods:

Supercomputers

Mining for cryptocurrency requires a lot of computing power. Supercomputers are perfect for the task, but they have their limitations. For one, they are extremely expensive, so it’s unlikely the average person could afford or even build one. Recently, engineers from the All-Russian Research Institute of Experimental Physics (RFNC-VNIIEF) were arrested for mining Bitcoin cryptocurrency using the institution’s computers, which actually belong to a secret federal nuclear facility in Russia. The supercomputer is said to be capable of performing quadrillion operations within a second. The perpetrators were caught when attempting to connect the computers to the internet, an act that violated the institution’s policies.

Smartphones

Another new trend involves using a combination of malvertising and smartphones’ CPU (Central Processing Unit) to carry out cryptomining campaigns. One recently-discovered campaign targeted Android devices using “drive-mining techniques,” which is best understood as an automated process for exploiting the CPU’s power. In the campaign, unsuspecting users were redirected to malicious sites after visitors were asked to solve a CAPTCHA, claiming suspicious behavior was detected on their devices. In reality, when users solved the CAPTCHA and clicked continue, their smartphones started mining for cryptocurrency, using 100% of the phone’s CPU power. Millions of Android devices are believed to have been used in this cryptomining campaign to mine Monero coins, a popular open-source cryptocurrency.

Advertising Screens

As previously mentioned, a large amount of CPU is required when mining cryptocurrency, making the process extremely costly. Some hackers have thus turned to using the CPU power of computer systems that don’t belong to them. In one such case, hackers used cryptomining code issued by NiceHash, the world’s largest cryptocurrency mining marketplace. NiceHash provides cryptocurrency mining codes to create software for embedding in websites, which is what the hackers did. It then hijacked the CPU power of website users to mine for Bitcoin. Fortunately, the computer systems infiltrated for the cryptomining campaigns were used to project advertisements, so hackers were caught before reaping any real benefits.

Malware/Google Ads

Malware is one way hackers can reach unsuspecting victims. The concept of using Google ads for malicious schemes is not entirely new. A recently-exposed scam was reported to have claimed new victims. Hackers bought ad space using Google’s AdWords and redirected users to malicious sites. Users who searched for Bitcoin related search terms would see the malicious ads and upon clicking on the spoofed ones, they were tricked into logging into their wallets. The spoofed sites served to steal login credentials of users’ cryptocurrency wallets and ultimately gain access to cryptocurrency. In this scam, hackers were able to elicit $50 million in cryptocurrency — but not all in one go. The campaigns spanned over the course of several months before it was exposed.

MS Word

Besides malware, hackers are also diverting their attention to Microsoft Word documents that contain executable programs known as macros. In a recent scam, phishing emails posing as a Hong Kong-based job recruitment firm posted a job announcement. Applicants were sent emails containing a Dropbox link with a malicious Microsoft Word file, which once clicked and enabled, infected the device with a malicious macro that scanned for cryptocurrency wallets. It also established an “implant for long-term data-gathering.” Because hackers now had a pool of registered computers with known wallets, they were able to make other scams like phishing even more personalized.

Mining for cryptocurrency is becoming more lucrative with many “miners” competing with one another. At the same time, another trend has been on the rise in which miners are joining forces to maximize their payouts. Known as mining pools, they consist of miners working together to mine for cryptocurrency and share the rewards. To stay ahead, it’s no wonder hackers are finding new ways to mine or steal others’ cryptocurrency in less-than-honest ways. Curious to find out what other trends are popular in the hacker community? Make sure to check back on our blog!

The post Mining For Cryptocurrency: The Tactics appeared first on Cloudbric.

Read Full Article
Visit website

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview