DDoS
SOX, data protection and compliance: Part 2
Security teams can relatively easily monitor and enforce data classification and data handling policies in enterprises and large corporations as we saw in Part 1 yesterday. Depending on how sensitive,
Read moreHackers prosper thanks to security’s blurred lines of responsibility
Permanent loss of data. Four words no CIO ever wants to hear, especially in the run up to General Data Protection Regulation (GDPR). But when delivery firm TNT confessed it
Read moreIs a certain level of fraud an acceptable cost of doing business?
Every business, in every area, risks being a victim of fraud. High profile issues such as cyber-attack or DDoS get the headlines, but often it is simpler issues that cause
Read moreShort, frequent, low-volume DDoS attacks continue to dominate
Service providers, hosting providers and digital enterprises are all impacted by DDoS attacks. But besides the headline-grabbing volumetric attacks, another more sinister DDoS method lies in the shadows.
Read moreThree key network strategies for the connected enterprise – Part 2
Successful rollout of enterprise digital transformation continues to be a mixed bag. We continue to see the explosive increase in connected devices (the IoT phenomenon) and large advances in application
Read moreThree key network strategies for the connected enterprise – Part 1
Successful rollout of enterprise digital transformation continues to be a mixed bag. We continue to see the explosive increase in connected devices (the IoT phenomenon) and large advances in application
Read moreThe enterprise manager’s checklist to getting to grips with DDoS attacks and the Botnet army
Distributed Denial of Service (DDoS) attacks jumped into the mainstream consciousness last year after several high-profile cases – one of the largest and most widely reported being the Dyn takedown
Read moreTelcos: when it comes to IoT security, prevention is always better than cure
Smart devices have arguably made consumers’ lives easier, and as they become more affordable, more of us are investing in the IoT. However, all too often, these smart devices are
Read moreDDoS via the Internet of Things – the first wave of attacks?
In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese for ‘the future’? And that’s what I believe we are seeing:
Read moreAre partnerships more important than standards?
To remain relevant and competitive businesses must embrace the Internet of Things (IoT). However, a significant collateral challenge faced in doing so is managing the torrent of data these “Things”
Read more