So you have the latest in DDoS and WAF protection. You’ve ensured your company is protected against SQL injections and cross-site scripting, but then an employee clicks on a pop-up to win a free iPad and your network has suddenly been infiltrated with malicious code. What happened?
In analyzing the 2015 cyber trends, we have found that cyber attackers can effectively defeat IP-based defense systems by launching application-level attacks that originate from real – but dynamic – IP addresses. One of the most common variations of dynamic IP attacks is clickjacking.read more
Public Transportation is the lifeblood of any economy and the circulatory system of modern day societies. From train, plane to automobile, the public transportation apparat is one of the core achievements in a highly functioning society. It includes everything from the roads, shipping ports and airports which are funded and maintained by public investments to wholly run publicly available train and bus systems.read more
We’ve all seen executives boast after a high profile cyberattack outage that they have done all that they can do to prevent a DDoS or other type of cyberattack outage. They suggest that these attacks are inevitable and outages, ergo, are inevitable. However, is this true?read more
Today the Telecom industries provide a wide array of global services that communicate with millions of customers.
This diverse business ecosystem is fraught with increasingly frequent cyber risks. It demands a commitment to cybersecurity that focuses on highly trained personnel, up-to-date solutions, and the right tools to detect, analyses, and respond to threats.read more
Over the last decade the technology industry has grown by leaps and bounds. Along with this rapid growth, cyber-attacks have evolved in parallel at an alarming rate. Part of this growth can be attributed to the growing number of markets and attack services available to the public.read more