Find

August 29, 2020

Six best practices to guard against identity theft

Secure your home wireless network, only use IoT devices that let you change the password and manage security settings, and securely dispose of old phones, laptops, and storage devices.
by | 2 min read
August 27, 2020

Africa’s largest wireless carrier MTN to sell Middle East units

The disposals will be done in a phased manner, with […]
by | 2 min read
August 22, 2020

China is building a GitHub alternative called Gitee

The technological decoupling between the U.S. and China has been […]
by | 2 min read
August 20, 2020

From Doorbells and Fish Tanks to Nuclear Reactors: Why secure IoT?

The arrival of 5G is spurring better connectivity than traditional fixed networks while at the same time empowering huge volumes of connected devices, allowing wireless connectivity on a massive scale.
by | 5 min read
August 19, 2020

Cyber adversaries leveraging global pandemic worldwide

The adaptability of adversaries enabled waves of attacks targeting the fear and uncertainty in current events as well as the sudden abundance of remote workers outside the corporate network.
by | 5 min read
August 17, 2020

The Furious Hunt for the MAGA Bomber

WEIRD THINGS HAPPEN in and around New York City nearly every […]
by | 17 min read
August 16, 2020

Sophos deconstructs Dharma RaaS attacks menacing SMBs during pandemic

The main targets for the Dharma RaaS attacks that Sophos analyzed are SMBs, with 85% of attacks seen in 2020 focusing on exposed access tools like Remote Desktop Protocol (RDP).
by | 3 min read
August 15, 2020

Mimecast reveals threat actors more driven by money than Intelligence or IP

The report also forecasts what types of attacks will likely spike in the next six months and offers recommendations on how to help organizations become more secure and resilient.
by | 3 min read
August 15, 2020

Protecting a mobile workforce with hybrid DNS security

Meeting the demand for greater speed and mobility means that internet traffic from mobile workers tends not to be backhauled to an organisation’s network via corporate points of presence such as servers or routers. As a result, DNS traffic to and from an organisation’s mobile users will not generally be visible to corporate security monitoring.
by | 3 min read
August 5, 2020

Hybrid Cloud – The Future of Storage

For storage and data management, this means that the exponentially growing data volumes not only have to be constantly maintained, stored and restored as quickly as possible in the event of downtime, but that data losses should be kept to a pre-calculated minimum.
by | 3 min read