Protection against APT’s everyone’s business

Companies should be as invested in protecting networks and data against advanced persistent threats (APTs) as cyber criminals are in targeting and implementing their attacks. In the past, APT counter measures were only implemented by certain sectors where there were...

Securing and managing devices the modern way

Organisations of all types and sizes are bringing vast numbers of devices into their IT infrastructure and networks. Moreover, these days, these devices are not only smartphones, wearables and tablets, because the Internet of Things (IoT) is seeing a slew of new...

The rise of nation-state attacks

A new phase of cyber warfare has begun, writes Simon McCullough, major channel account manager at F5 Networks. Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures – they’re also actively seeking trade...

How to protect IoT devices in your business

The Internet of Things (IoT) is making its presence felt in a big way. It is expected that there will be 29-billion connected devices by 2022. This opens a whole world of opportunities for businesses to cement their relevance by evolving how they operate. It also...

How to delete your Twitter account and keep digital memories

There is a tendency to deactivate social media accounts including Twitter and Facebook. It happens due to different reasons: unstable political situation, the risk of being followed, intention to protect one’s personal data. Also, a lot of users believe that...
Security terminology demystified: the worm

Security terminology demystified: the worm

A secretive code army hidden inside an innocuous looking email and ready to wreak havoc on your computer empire In our comprehensive guide to all things deadly and dangerous in the world of computer security you would have noticed that, along with Greek mythology...