Why Outsmart Cyber Attackers When You Can Remove Them Entirely?
By Kowsik Guruswamy, Chief Technology Officer at Menlo Security Cyber threat actors have gotten smarter–or lazier–depending on your perspective. It used to be fairly common for attackers to spend days…
2020 – The Year of The Weaponized Internet
By Darren Anstee, Chief Technology Officer, SBO International, NETSCOUT The risk posed by the weaponization of internet infrastructure for DDoS attack generation will be a hot topic for ISPs once…
Government Agencies Are Prime Target for Cyberattacks
By Gerry Grealish, Chief Marketing Officer, Ericom Software On August 16, 2019, 22 small towns, municipalities and local governments in Texas were hit by a coordinated ransomware attack. The hackers…
Artificial Intelligence in Cybersecurity… Is The Glass Half-Empty or Half-Full?
A brief interview summary from the Digital Transformation EXPO Europe 2019 London, England – There’s a tremendous amount of buzz surrounding A.I. these days. Some believe it will present us…
3-D Secure: The Legacy Protocol Making a Comeback to Secure Online Payments
By Jennifer Singh Consumers today are spoiled for choice – which clothes to wear, gadgets to buy and payment networks to use to acquire these goods. The competition is tight…
Data of 21 million Mixcloud users available for sale on the dark web
The online music streaming service Mixcloud was recently breached by a hacker that is attempting to sell stolen user data in a dark web marketplace. On Friday, the hacker that…
8 Most Common Cyber-security Mistakes You Should Avoid in 2020 and Beyond
By Sam Chester Be it stolen customer data, phishing, or ransomware attacks, successful cyberattacks can affect businesses of any size and in any industry. A 2018 study by Juniper Research…
5 Simple Ways to Protect Your Smartphone from Cyber Attacks
By Jamshaid Chaudhary, Kamil Web Solutions Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse for many of…
3 Cybersecurity Trends & Predictions for 2020 (from Illumio)
By PJ Kirner, CTO & Founder of Illumio 1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.” “Cyberattacks on an…
What Does A Cyber Security Consultant Do?
By Stuart Cooke, Digital Marketing Manager at Evalian Are you considering becoming a cybersecurity consultant? Or perhaps you’ve recently become aware of the importance of this type of security and…
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps
By Yasir Liaqatullah, vice president of product management at A10 Networks A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access to the software as a…
The Importance of Cybersecurity When Dealing With Online Customers
By Riya The internet has become one of the most populated places ever known. With more businesses deciding to integrate, it is good to note that the level of insecurity…