The travel industry is changing.
As the world’s population grows and migrates from region to region, it adds to the number of people traveling back-and-forth from their new homes to loved ones in their countries of origin. Additionally, the hyper-competitive tour industry continues to invest big money to entice vacationers and sightseers to venture to new places far and wide. Be it planes, trains, cruises, or automobiles, people are getting around to motels, hotels, hostels and resorts, and the amount of money generated is huge.read more
On June 13th, I’ll be back in the U.S. and will be going live on Facebook to talk about privacy, including some crucial questions to ask your healthcare providers, banks, and others to make sure your data is protected. Make sure to follow the Radware Facebook page for more updates. I look forward to answering your questions and chatting with you then.read more
In the “Silicon Hills” capital of the deep South, the world of technology movers and shakers descended upon Austin’s Convention Center for Light Reading’s Big Communication Event to discuss the latest disruptive technologies ripe to revolutionize the way we communicate.
Meanwhile, in the streets of Austin, a prickly regulation battle forced ultra-hip transportation companies Uber and Lyft to move their businesses out of the metro area. As a result, community engineers rallied around the clock to create a new app, called Ride-Austin, to fill the void – and reportedly in only 2 weeks’ time! This is only fitting in a startup town like Austin, as modern businesses everywhere are confronted with the reality of offering services to consumers in a nimble, automated, intelligent, dynamic, and virtual manner.read more
EgyptAir’s 20 Year Terror History:
Some quick thoughts on the most recent loss of EgyptAir’s flight 804 and how persistent terror has been one of the leading causes of accidents in this airlines history. The main questions to be asked as we move forward are as follows:
– If physical terror has played such a major role in aviation accidents, can cybersecurity sabotage be far behind?
– What controls / testing are done to ensure the ongoing operations of jets that rely increasingly on computers are safe and sound?read more
Smartphone botnets have become increasingly popular over the last few years. Android software is highly vulnerable to malware and is constantly targeted by attackers due to the OS’s popularity around the world. Often times the malware is installed on the device via malicious apps found in the Google play store, 3rd party app stores, malicious emails or drive by downloads while browsing from your device.read more
Many of us are familiar with Secure Hypertext Transfer Protocol (HTTPS) that uses a cryptographic protocol commonly referred to as Transport Layer Security (TLS) to secure our communication on the Internet. The benefit of securing our communication is obvious; however, the encrypted communication does have its downside.read more
Airlines, retailers, travel service providers, banks, marketplaces, and social media – all rely on their web applications to generate revenues or facilitate productivity. They typically develop and maintain their own web applications which are tailored for their business needs. To support the growing needs of their online presence, they are adopting agile development practices also known as DevOps and Continuous Deployment.read more
On occasion, the topic of DDoS defense has come up and invariably goes to, “Why can’t organizations rely on ISP and cloud scrubbing services to protect themselves from DDoS attacks?” The conversation also rolls over to, “Why can’t organizations rely on on-premises solutions to protect themselves from DDoS attacks?” The latter is usually asked by someone who is a novice in the field, but both are valid questions. The true answer lies with a combination defense or, to coin a common security phrase, “defense-in-depth.”read more