New Research Shows Why We Should Trust CSPs With Our Data Security

New Research Shows Why We Should Trust CSPs With Our Data Security   New research, published this week, shows that the most effective way of protecting consumers from online security threats is to apply network-based security solutions, because CSPs are best placed to deliver security to the mass market. Furthermore, CSPs can gain significant revenue…

Will Your Defense Conquer World Cup Malware?

Will Your Defense Conquer World Cup Malware? Don’t let cybercriminals score. Beat their game-plan.  Cybercriminals typically take advantage of the huge public interest in major international events. The FIFA World Cup 2018 that begins shortly in Russia is no exception and cybercriminals have been busy exploiting the excitement about the world’s biggest sporting event. The…

Data Privacy: Five Ways to Ensure You Comply with GDPR

  Data Privacy: Five Ways to Ensure You Comply with GDPR Because, the times, they are a’ changin’ for data management Companies and organizations across the world better get ready. Fast. Because the EU’s new General Data Protection Regulation (GDPR) comes into force on 25th May, and it’s a game-changer for the way they collect,…

Criminals Hacking CPUs to Mine Cryptocurrencies

  Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

“Anonymous” to Erase Israel from the Internet—Or Is It?

  Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

IoT Security and the Home Consumer

  True story. All I wanted was to upgrade our home thermostat to a smart one. What did I end up with? A lecture about IoT security. Who gave me the lecture? You won’t guess—my wife! Smart and educated, my wife is well-versed in what’s going on in the world through reading newspapers and watching…

Recapping MWC 2018: Four Things We Would Like to Have Seen

Another Mobile World Congress (MWC) has come and gone. An impressive event as always, this year over 100,000 people descended on an unusually chilly Barcelona for the world’s largest exhibition for the ever-expanding mobile industry to learn about the latest trends and technologies – and to showcase the latest innovations. If one word were to…

From the Flu to DDoS – an Epidemic of Epidemics!

Last week, while the mobile industry was busy celebrating telecom innovation at MWC18, another kind of innovation was making headlines: a record 1.35 Tbps DDoS attack was launched (and it has already been surpassed), causing some disruption and highlighting the potential for much worse. In this instance, the attack was detected and mitigated relatively quickly—but…