Mobile Virtualization – Solving the BYOD Problem
For many users today, how they use technology is defined by mobile devices. Their primary device is not a desktop computer, or even a laptop. Instead, it’s a tablet or a smartphone. Instead of data...
View ArticleCTO Insights: Light Can Keep the Dark at Bay
We are all afraid of the unknown. Why? Because we all want to be in control of our lives: what career path to take, how to deal with our finances, where to go for a vacation. We like certainty. We...
View ArticleCTO Insights: Vulnerabilities for Sale
2014 showed that vulnerabilities could be found in all applications – both Heartbleed and Shellshock caught system administrators off-guard by revealing that open-source server applications could have...
View ArticleCTO Insights: Defending Your Organization From Insider Attacks
If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received years ago – turns against...
View ArticleCTO Insights: Internet of Things — Whose Data Is It, Anyway?
Everywhere you look, it seems to be that everything is becoming “smart”. On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate is, and so on. At home, a...
View ArticleDefending Critical Systems: Does It Have To Be “Smart”?
Everywhere I go it seems to be that “critical” systems are being attacked. Earlier this year people were talking about whether planes could be hacked. We’ve talked about whether smart grids can be...
View ArticleTargeted Attacks: Not All Attacks Need To Be Sophisticated
The security industry loves to talk about how “sophisticated” attacks can be. Usually this takes the form of us saying how advanced and sophisticated an attack is, what new methods were used to hide...
View ArticleCTO Insights : Will 2016 Be a Better Year for Cyber Security?
2015 was a big challenge for cyber security. There were a lot of fireworks with all the high profile targets and attackers that made headlines. But now we can ask, will 2016 be a better year for cyber...
View ArticleLinkedIn Breach: More Questions than Answers
Earlier this week, it was reported that the 2012 breach of LinkedIn was far worse than originally thought: instead of the 6.5 million stolen records that were reported at the time, it turned out that...
View ArticleCTO Insights: The General Data Protection Regulation (GDPR) Is Coming, What Now?
Based on the incidents we saw in 2016, I recommend that organizations enter 2017 with caution. From the growth of Business Email Compromise (BEC) attacks to cybercriminals using more effective ways to...
View Article
More Pages to Explore .....