Hardware/Network

Back to homepage

Botnets present 195,000 security threats every day

More than 100 million unique targets are being hit on a daily basis.Botnets, networks of infected machines that are used by cybercriminals everywhere to do their sinister bidding, are still

Majority of focused cyber-attacks are being stopped

Companies are getting better at spotting things like ransomware and DDoS.Companies are nowadays faced with more than double the amount of ‘focused attacks’, compared to last year. However, they are

Real-time detection of consumer IoT devices participating in DDoS attacks

Could we detect compromised consumer IoT devices participating in a DDoS attack in real-time and do someting about it? A group of researchers Princeton University have presented some encouraging results

Outdated security solutions are putting businesses at risk of evolved cyberthreats

The latest trends in cybercrime have seen it all — advanced exploits allegedly developed by high-profile threat actors used in massive ransomware attacks, creativity of spam and phishing attacks on

Threat intelligence is only intelligence if you use it

Threat intelligence can be valuable, if you actually have it and you’re prepared to make use of it.It has been reported that C-level executives are suffering from a flood of

Internet of Broken Things? 10 key facts about IoT

A recent survey shows 64 percent of organisations have deployed some level of IoT technology, and another 20 percent plan to do so within the next 12 months. This means

Securing your network in the IoT revolution

Instituting a comprehensive device management plan is essential to locking down Shadow IT at your organisation. The relationship between network security and the Internet of Things (IoT) has never been

Improving Security By Pulling The Plug On USB Ports

When it comes to cybersecurity, it’s no secret that the human aspect of any organisation is its weakest link. From bad password sharing practices to falling victim to phishing emails,

What is Mitre’s ATT&CK framework? What red teams need to know

The ATT&CK framework allows security researchers and red teams to better understand hacker threats.The ATT&CK framework, developed by Mitre Corp., has been around for five years and is a living,

In Modern Data Centers Security Must Take Center Stage

As Your Organization Modernizes the Data Center and Shifts to Cloud-based Environments, You Must Rethink Your Approach to Security. Data centers are changing rapidly and how we protect them must