Shedding the Light on Deep Network Visibility for Cyber Intelligence Applications
DWDM is the backbone technology for optical networks but presents a challenge to government agencies with intercept responsibilities. By Mike Seidler, Senior Product Manager, NetQuest Corporation Dense Wave Division Multiplexing…
CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence
By Smit Kadakia, Co-founder, Seceon Overview The goal of artificial intelligence is to enable the development of computers to do things normally done by people — in particular, things associated…
New Attack with Seldom Used Vector
PowerSniff By Charles Parker, II; Information Security Architect Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for…
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from…
The best practices in dealing with ransomware
By Milica D. Djekic Our society is becoming dependable on new technologies in both – legal and illegal connotation. The hacker’s community is getting bigger and bigger and it’s right…
Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday items is on a trajectory…
This Data is mine, mine, mine, mine.
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. It seems every time I write an article I could mention Trumps’ approach to cybersecurity; watching him is like an old Animaniacs…
The Dawn of the DDoS of Things (DoT)
Dr. Chase Cunningham, Director of Cyber Operations at A10 Networks Last year saw an unprecedented uptick in the volume, size, and scope of distributed denial of service (DDoS) attacks. Led…
Tesco Bank
Oversight By Charles Parker, II; Information Security Architect And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as…
Nation State Cyber Attacks Emerge from the Shadows
By Leo Taddeo, CISO at Cyxtera Technologies Nation-state hackers are increasingly targeting government agencies, critical infrastructure facilities, and businesses with powerful, sophisticated techniques that interrupt business operations, leak confidential information…
Why today’s university students pose a massive cyber threat — and what to do about it
By François Amigorena, CEO, IS Decisions To any IT security person working within a university, students are one heck of a headache. Old enough to make adult decisions but young…
Time to Get Serious About Internet of Things Cyber security
By Nate Lesser, Managing Director of MasterPeace LaunchPad The Internet of Things (IoT) is made up of everyday objects built with the ability to sense, analyze, and communicate information about…