Back to homepage

Tips for Hardening Networks Against IoT-based DDoS Attacks

The Internet of Things (IoT) has been a boon for the cybercriminal industry. IoT devices number in the billions worldwide and most are unsecured or undersecured, making them appealing targets

Industry Insights

The “Don’t Ask, Don’t Tell” Problem with Data Privacy in Tech

“Freedom consists not in doing what we like, but in having the right to do what we ought.” – Pope John Paul II. Sometimes we need to look at the past


Cryptomining apps are on the rise, malicious apps in app stores decline

RiskIQ analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the cryptocurrency landscape is


Protecting your Network Against Ever-Changing Cyber-Attacks

There have been two notable evolutions made by hackers recently in the DDoS arena. First, there’s been an expansion of botnets. They’ve moved beyond PCs to compromised Internet of things


To Keep Them Safe Online, Teach Them to Phish

Security experts in Hamilton, Bermuda, yesterday hosted a live hacking demonstration showing event attendees the ease with which attackers are able to gain access to a corporate network through a


Are regulations keeping you from using good passwords?

Most companies are using password “best practices” that are out of date and ineffective. Regulations are getting in the way of changing them. I rarely go to a conference where


What is behind the decline in cyber crime victim rates?

Businesses have spent heavily on cyber security measures over the last year and anyone with even half an eye on the technology industry will by unsurprised by the reasons why.


The Growing Threat Of Phishing Attacks Outside Of Email

Social engineering attacks are usually associated with deceptive phishing emails in which the victim is tempted to click on a malicious link or open a malicious attachment to help an

Industry Insights

Mind The ‘Cyber Risk’ Gap

As the number of digital transactions dramatically increases, so does the risk and likelihood of cyber-attack.  This means that organisations handling large amounts of sensitive data are more likely to


For enterprise cyber defence, there should be more than one solution

Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a