Will Your Defense Conquer World Cup Malware?

Will Your Defense Conquer World Cup Malware? Don’t let cybercriminals score. Beat their game-plan.  Cybercriminals typically take advantage of the huge public interest in major international events. The FIFA World Cup 2018 that begins shortly in Russia is no exception and cybercriminals have been busy exploiting the excitement about the world’s biggest sporting event. The…

Data Privacy: Five Ways to Ensure You Comply with GDPR

  Data Privacy: Five Ways to Ensure You Comply with GDPR Because, the times, they are a’ changin’ for data management Companies and organizations across the world better get ready. Fast. Because the EU’s new General Data Protection Regulation (GDPR) comes into force on 25th May, and it’s a game-changer for the way they collect,…

Criminals Hacking CPUs to Mine Cryptocurrencies

  Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

“Anonymous” to Erase Israel from the Internet—Or Is It?

  Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

IoT Security and the Home Consumer

  True story. All I wanted was to upgrade our home thermostat to a smart one. What did I end up with? A lecture about IoT security. Who gave me the lecture? You won’t guess—my wife! Smart and educated, my wife is well-versed in what’s going on in the world through reading newspapers and watching…

Recapping MWC 2018: Four Things We Would Like to Have Seen

Another Mobile World Congress (MWC) has come and gone. An impressive event as always, this year over 100,000 people descended on an unusually chilly Barcelona for the world’s largest exhibition for the ever-expanding mobile industry to learn about the latest trends and technologies – and to showcase the latest innovations. If one word were to…

New Report Reveals How Tier-1 Mobile Operators Increase ARPU and Customer Satisfaction in Today’s Competitive Environment

3 tangible benefits Communications Service Providers can derive from becoming Masters of Security The ancient quote from Heraclitus: “The Only Thing That Is Constant Is Change” is as relevant today as it ever were. It is certainly very pertinent to the Telecommunications industry. In fact, it’s never boring working in the telecom industry because things…

Time for Service Providers to Become “Masters of Security”

US Government Acting against Cybersecurity Threats.  While palming off incidences of Fake News like they were annoying bugs, US President Trump is taking cyber-attack threats much more seriously. On May 11, 2017, the President issued Executive Order 13800, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure”. The US Department of Commerce, Homeland Security Release…