The Importance of Mobile & Network Security in Today’s Digital Era

Mobile & Network Security in Today's Digital Era

Introduction With cyber-attacks as well as cyber-crime against large companies rising 40 percent globally in 2014, network security needs to be looked at afresh and in a new dimension. Adding to this problem is the massive proliferation of mobile and smart phones across the world. With most mobiles capable of accessing the internet from any […]

How to Protect your Business from a DDoS Attack

Protect your Business from a DDoS Attack

Successful attempts by hackers like Lizard Squad to take down major websites have become so common that barely a week goes by without another victim.  Recently, the Thai Government, Reddit and the National Crime Agency’s have been targeted by Distributed Denial of Service (DDoS) attacks. The number and intensity of DDoS attack are rising in 2015. […]

How to Protect Valuable IP

The top secret recipe for Heinz Tomato Ketchup is thought to be known by only eight to ten people in the world; KFC’s original recipe chicken is seasoned with a secret blend of eleven herbs and spices that is held in a vault in its Louisville, Kentucky HQ; and the ingredients used by Coca Cola […]

Cyber Attackers Posing as Legitimate Insiders Represent Greatest Security Risks

Cyber Attackers Posing as Legitimate Insiders Represent Greatest Security Risks

61 Percent Cite Privileged Account Takeover as Most Difficult Cyber Attack Stage to Mitigate; Nearly Half Still Believe They Can Prevent Attackers from Breaking into a Network Newton, Mass. Cyber attacks that exploit privileged and administrative accounts – the credentials used to manage and run an organization’s IT infrastructure – represent the greatest enterprise security […]

Safe Harbour has been Ruled Invalid

Safe Harbour has been Ruled Invalid

Jonathan Perez, global privacy officer, at BMC welcome this decision and call for the use of Binding Corporate Rules for data regulation. [su_note note_color=”#ffffcc” text_color=”#00000″]Jonathan Perez, Global Privacy Officer, BMC : “The decision taken by the European Court of Justice is a clear message being sent out to the businesses that Safe Harbour can no […]

Launching Threatarmor to Strengthen Enterprise Defenses Against Cyberattacks

Threatarmor to Strengthen Enterprise

Turn-key Security Device Reduces Network Attack Surface and Alert Fatigue Ixia [1] (Nasdaq: XXIA), a leading provider of application performance and security resilience solutions, launched a new front line of defense for enterprise networks. Ixia’s ThreatARMOR represents another innovation for the company’s Visibility Architecture, enabling enterprises to reduce the ever-increasing size of their global network […]

DDoS Cyberattack Hits Thai Government

DDoS Cyberattack

Marc Gaffan, VP and GM of the Incapsula product line at Imperva, commented on news that the Thai Government was hit by a DDoS cyberattack and that tens of thousands of people have signed a petition against the proposal they call the “Great Firewall of Thailand,” a reference to the so-called “Great Firewall of China” […]