IDEMIA partners with Microsoft to provide next-gen eSIM services

“The combination of the IDEMIA and Microsoft Azure expertise will enable us to deliver the best-in-class eSIM Remote Subscription Management services that secure connectivity for consumers, devices and citizens across the world,” says EaChaillioux.

Anatomy of a DDoS attack: Extortion and mitigation

Although threat actors have monetized DDoS threats and attacks in the past, we believe that popularization of cryptocurrency, willingness of some organizations to meet extortion demands (as was seen in the ransomware attack on Colonial Pipeline), and affordability of DDoS as a service (DDoSaaS) have encouraged threat actors to pursue these kinds of activities.

Must know 22 cybersecurity statistics for 2022

As the rollercoaster of a year that was 2021, a list of important cybersecurity data that will help you keep on top of your security and privacy game in the coming year.

Help AG as a Service highlights a service-centric cybersecurity evolution

Help AG produces future-ready services in terms of people, processes, and technology on an MRC/PAYG basis, driven by its vision to provide the best degree of protection and user experience.

Why attackers are focusing on low-volume persistent DDoS attacks

Our security team tracks DDoS weapons and their behaviors and reports on their frequency and impact over the last several years. Our latest H1 2021 DDoS Attack Mitigation: Global State of DDoS Weapons Report provides detailed insights into the origins of DDoS activity, highlighting how easily and quickly modern malware can hijack IoT devices and convert them into malicious botnets.