Securing the Network Edge

A New Joint Analysis from the Cyber Threat Alliance Outlines the Growing Threat to the Devices Deployed at the Boundaries, or Edges, of Interconnected Networks     Digital transformation continues to generate new networking environments, from multi-cloud networks to SD-Branches to the emerging 5G-enabled remote edge, comprised of a growing number of Continue Reading

Optimising IoT bandwith with delta updates

As connected devices proliferate in the Internet of Things (IoT), companies need an efficient over-the-air (OTA) update mechanism for remotely delivering new software, features, firmware updates and security enhancements to potentially huge numbers of geographically dispersed embedded devices. Pushing software updates can range from a few to hundreds of megabytes. Continue Reading

Will Emerging Threats Tip the Scales?

This is a summary of an article that first appeared in SecurityWeek on December 07, 2018. Digital devices and infrastructures continue to be woven deeper into every aspect of our lives, whether through connected homes, cars, and mobile devices, or by expanding their role in business, government, and even critical Continue Reading

A Look Into The New Strain Of BankBot

BankBot is a family of Trojan malware targeting Android devices that surfaced in the second half of 2016. The main goal of this malware is to steal banking credentials from the victim’s device. It usually impersonates flash player updaters, android system tools, or other legitimate applications. Once installed, it hides Continue Reading

CIO Agenda – Increase Productivity – everywhere for everybody!

One of the key challenges in companies today is the need for seamless digital collaboration across devices, storage systems and geographical locations with internal and external users. The increasing mobile workforce needs enterprise-grade tools for secure collaboration that is compliant with current rules and regulations, but still as easy to Continue Reading

Streaming Video to iOS-Based Devices

July 27, 2017 by Jamie Sherry Online video consumption on mobile devices continues to grow. While viewing habits are different on tablets and smartphones, this trend is boosting engagement and loyalty with content across the board. At the same time, Apple dominates in device sales and as an individual app store—despite Android Continue Reading

Cybercrime At Your Service, Mac

There is a pervasive belief, even among security professionals, that Apple Mac devices are immune to security breaches. And while there is some truth behind that belief, it’s time that we take this particular attack vector more seriously. In my opinion, part of the reason why folks have been rather Continue Reading

Byline: Artificial Intelligence: Cybersecurity Friend or Foe?

Security strategies need to undergo a radical evolution. Tomorrow’s security devices will need to see and interoperate with each other to recognize changes in the networked environment, anticipate new risks and automatically update and enforce policies. The devices must be able to monitor and share critical information and synchronize responses Continue Reading

Bricker Bot – A Silver Lining to Force Accountability for IoT Security?

The Bricker bot made the news a couple of weeks ago as being responsible for knocking unsecured IoT devices offline, rather than hijacking them into other botnets and using them for a DDoS attack like the massive event we saw last year against DYN. This is the third botnet that Continue Reading

Byline: IoT is Everywhere – Your Security Should Be Too

Over a million new IoT devices are being connected to the internet daily. Experts predict that as many as 25 to 50 billon IoT devices and sensors will be deployed by 2020, for an average of 4.3 internet-connected devices for every man, woman and child on the planet. Consumer IoT devices Continue Reading

>