Network Security

Network Security Defined In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Network Security from the most secure and efficient enterprise firewall. Network security is an ongoing challenge as organizations become more distributed, applications…

7 cybersecurity trends to watch out for in 2018

I think it’s fair to say, 2017 wasn’t a great year for cyber-security. We saw a large number of high-profile cyberattacks; including Uber, Deloitte, Equifax and the now infamous WannaCry ransomware attack. Despite the constant flow of security updates and patches, the number of attacks continue to rise. This raises the question…will 2018 be better…

A Brief Summary of Cyber Warfare

Throughout past history, civilian commercial entities have not been the primary targets of warfare and have even been avoided as targets. In the earliest days when such groups existed, they did not make feasible targets in and of themselves. Such organizations existed within the physical boundaries of nation-states, such that attacks upon them could only…

The Cloud’s Hazy Security

A significant percentage of IT systems are cloud-based, according to a CompTIA survey of 502 U.S companies. The cloud is a key enabler for emerging technology, suggests the poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, CompTIA…

Cyberstalking in a Large Sample of Social Network Users: Prevalence, Characteristics, and Impact Upon Victims

The aim of this study was to determine the prevalence of cyberstalking victimization, characteristics of victims and offenders, and the impact of cyberstalking on the victims’ well-being and mental health. An online survey of 6,379 participants was carried out, involving users of the German social network StudiVZ. Subjective mental health status was assessed with the…

Reinventing M&A and integration strategy

As technology advances at warp speed, companies should consider how their M&A programs can take advantage of big data to make better and faster decisions. Watch the video below to hear from Mitch Berlin and Sid Khosla, about how big data, analytics, cybersecurity, cloud computing, and social media play a role in developing a strategic…

Cyber Threats vs Vulnerabilities vs Risks

It’s common for terms such as cyber threats, vulnerabilities and risks to be conflated and confused. This post aims to define each term, highlight how they differ and how they are related to one-another. Cyber Threats Cyber threats, or simply, threats refer to circumstances or events with the potential to cause harm by way of their outcome. A few examples of…