Back to homepage

What is a botnet? And why they aren’t going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack. Botnets act as a force multiplier for individual attackers,

Internet Of Things: 5 Ways To Overcome Security Challenges

The promise, benefits, and value of the Internet of Things (IoT) have been documented extensively, but a number of widely publicized IoT attacks leaves the impression that IoT is deeply

DDoS attackers increasingly targeting cryptocurrency exchanges

The extraordinary volatility of the price of bitcoin has spurred speculators to employ a wide variety of tricks to make it swing between extremes, so that they can take advantage

Security and costs holding back those looking to implement IoT projects

While 94% of IT professionals from organisations that are undertaking Internet of Things (IoT) initiatives say they need to invest in IoT over the next 12 months in order to

From Trapping to Hunting: Intelligently Analyzing Anomalies to Detect Network Compromises

By Dr. Giovanni Vigna, Co-Founder and CTO at Lastline, Breach Detection Systems (BDSs) identify patterns of events in order to determine if a network has been compromised. Event streams include

The next step in network security evolution

In 1987, Bernd Fix developed a method to neutralize the Vienna virus, becoming the first known antivirus software developer. In 2017, as we pass the 30-year anniversary, a lot has

The Critical Difference Between Vulnerabilities Equities & Threat Equities

Why the government has an obligation to share its knowledge of flaws in software and hardware to strengthen digital infrastructure in the face of growing cyberthreats.In mid-November, Rob Joyce, the

To protect your network, you must first know your network

A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least cited control, with only 16% of CISOs leveraging

Keep tech separate to secure Smart Homes and Cities

Just because it is possible to integrate a smart device into an IoT system, it doesn’t mean we should.With global Internet of Things (IoT) adoption showing no signs of slowing

Web app attacks rise as IoT botnet threat increases once again

Latest Akamai security report predicts possible return of IoT botnets as the holiday season approaches.Web users are being bombarded with a significant rise in online attacks hijacking web-based applications, new