Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in reverse. For those young adults, whose birth years begin with the…

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabilities, 5G is not just another bigger, better, faster network than 4G. It is a completely new concept in network…

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can open up our devices to…

Will Your Defense Conquer World Cup Malware?

Don’t let cybercriminals score. Beat their game-plan.  Cybercriminals typically take advantage of the huge public interest in major international events. The FIFA World Cup 2018 that begins shortly in Russia is no exception and cybercriminals have been busy exploiting the excitement about the world’s biggest sporting event. The numbers are staggering. FIFA estimated that 715.1…

Data Privacy: Five Ways to Ensure You Comply with GDPR

  Data Privacy: Five Ways to Ensure You Comply with GDPR Because, the times, they are a’ changin’ for data management Companies and organizations across the world better get ready. Fast. Because the EU’s new General Data Protection Regulation (GDPR) comes into force on 25th May, and it’s a game-changer for the way they collect,…

Criminals Hacking CPUs to Mine Cryptocurrencies

  Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

“Anonymous” to Erase Israel from the Internet—Or Is It?

  Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…