Natalie

3 min read

The Collateral Damage of DDoS Attacks - Part 1. What is what

ISP networks are part of the backbone of the Internet—and carry any and every security threat. Most threats are not considered by the ISP, since they do not harm their own infrastructure, they are just another packet flow. While this is true for...

Read More

5 min read

Seven Deadly Deceptions of Network Automation

The greatest deception men suffer is from their own opinions. - Leonardo da Vinci

Read More

2 min read

Data Capital: Separating the Winners and Losers of Tomorrow

It’s undeniable; digital transformation is reshaping the world around us. Analyst firm IDC predicts that by 2021, at least 50 percent of global GDP...

Read More

5 min read

Humanity and Artificial Intelligence – Shape Our Future in Harmony, Rethink Our Societies.

Of all the emerging technologies that are set to impact the way we work and the way we live, Artificial Intelligence (AI) is, without doubt, the most...

Read More

3 min read

Attackers turn to IoT and ICS to find gaps in security

Research from Cisco and partners reveal increased interest in IoT and ICS from security professionals and attackers alike Technology solutions and...

Read More

1 min read

The Fourth Network Revolution

We stand in the midst of a technological revolution. The complexity, scale, and more importantly, the pace, are unlike anything humankind has...

Read More

2 min read

Is your Financial Service Firms defensive strategy stuck in the past?

It’s that time of the year again. The annual month where suddenly everyone is a college basketball expert; March Madness. This past weekend, I found...

Read More

2 min read

Using machine learning to detect possible insider threats

Cloud applications are now commonplace in enterprises. From productivity applications to storage, employees and IT departments are realizing the...

Read More

Do You Know the Anatomy of a Ransomware Attack?

See how an effective ransomware attack comes together. This is why today's enterprises require effective security....

Read More

1 min read

No IP no future?

Content producers, broadcasters, and service providers must have high-speed interconnections for the distribution of programs, playout, over-the-top...

Read More