December 7, 2017

Are you caught in the Bitcoin “gold rush” but is someone else reaping the rewards?

Seems like everyone has been talking about Bitcoin lately. If you remember the dot com boom of the late nineties like I do, you might have […]
November 21, 2017

Big Online Bargains Mean Big Online Threats. Who’s Most at Risk during Black Friday?

If you’re an online bargain hunter like me, this upcoming weekend provides an abundance of deals you won’t want to miss out. In fact, this year’s […]
November 9, 2017

Security, Security, Security: The Top Three IoT Challenges Confronting CSPs

While this may sound like the old joke about the three “L’s” of real estate success — location, location, location — it’s actually deadly serious. When […]
October 19, 2017

IoT Security: Threat to an Opportunity

The promise of connected things has finally started to make itself felt. Carriers are busy launching their IoT offerings preparing for the massive burst of growth […]
July 13, 2017

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How […]
July 11, 2017

From WannaCry to Petya. Are You Protected from the Latest Ransomware?

Ransomware-as-a-service has been identified as the next great cyber threat, and the stats indicate we’re already living the nightmare. Forbes reports that the growth is enormous, […]
March 23, 2016

About Cyber-attacks, Hacktivists, and Security Solutions

In the 21st century, cybercrime is rampant with hackers stealing and using data from individuals, companies and governments for their personal, financial or political gain. In particular, government agencies and large corporations are prime targets for organized hacker groups (“hacktivists”) such as Anonymous.
June 3, 2015

Allot CloudTrends Report Q2/2015: Malware can get into your network through backdoors!

With the growth of enterprise mobility and cloud migration, enterprises and SMBs are facing complex security issues. Despite being quite effective in warding off known threats, […]
Open Popup
  • Why not subscribe to our blog?

    Click to receive our newest blog posts directly to your inbox.