2018 In Review: Schools Under Attack As adoption of education technologies expanded in 2018, school networks were increasingly targeted by ransomware, data theft and denial of… Daniel Smith | December 19, 2018
Cybersecurity for the Business Traveler: A Tale of Two Internets Many of us travel for work, and there are several factors we take into consideration when we do. Finding the… David Hobbs | November 27, 2018
IoT, 5G Networks and Cybersecurity: Safeguarding 5G Networks with Automation and AI By 2020, Gartner says there will be 20.4 billion IoT devices. That rounds out to almost three devices per person… Louis Scialabba | September 18, 2018
IoT, 5G Networks and Cybersecurity: The Rise of 5G Networks Smartphones today have more computing power than the computers that guided the Apollo 11 moon landing. From its original positioning… Louis Scialabba | August 16, 2018
The Evolving Network Security Environment – Can You Protect Your Customers in a 5G Universe? Smart Farming depends on internet of things (IoT) devices and sensors to monitor vast farm fields, guiding farmers’ decisions about… Louis Scialabba | July 17, 2018
Walking Through the European Minefield of Cyber-Threats European IT professionals report securing business continuity as the #1 challenge, even more than avoiding revenue loss or protecting reputation Ben Zilberman | April 6, 2017
How to Prepare for a DDoS Attack Our 2015-2016 Global Network & Application Security Report documented that 51% of businesses suffered a DDoS attack in 2015. Further,… Ron Winward | March 29, 2016
When Trends Collide – Ransomware and IoT Attacks Continue A highlight of the annual Global Network & Application Security Report is always the deep case studies. Each year, we… Ben Desjardins | March 8, 2016
Your Internet or Your Candy David Storch is a Product Manager and Principal Consultant at Atos and a featured guest blogger According to the UK’s… David Storch | March 2, 2016
Could Your Network Survive APDoS or Hit-and-Run DDoS? Can you guess where a network breach first occurs? When a CISO asked this question during a recent business trip… Ben Zilberman | February 25, 2016
The Value of Letting the Technical Professionals Select a Security Vendor David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger. Management is ultimately responsible… David Monahan | February 23, 2016
Network-as-a-Sensor: A New Approach to the DDoS Problem Mike Geller from Cisco’s CTO office and Ehud Doron of Radware’s CTO office presented at Cisco Live Berlin 2016 the… Ron Meyran | February 17, 2016