cyber defense
Los Consumidores Mexicanos Esperan con Entusiasmo la Protección de la Ciberseguridad Basada en la Red
El 2020 está siendo un año difícil. Mientras México se enfrenta a la pandemia de COVID-19, los ciudadanos también hacen frente a peligrosos virus y ataques informáticos que se propagan rápidamente por ...
Is Telco Cybersecurity the New Competitive Edge for Service Providers?
In my 20+ years working for and with telecommunication providers around the world, I’ve witnessed firsthand how the industry has evolved to offer continuously improved services to a wide audience of consumers ...
How important is cybersecurity to mobile subscribers?
(This is a guest post by Ian Parkes, director at Coleman Parkes Research, a full-service, UK-based, end-to-end B2B market research company covering international telecom and a wide range of other industries.) My ...
Bringing network stability and security back to businesses big and small
If you remember the pre-pandemic fun of dining out in a Chinese restaurant, then you probably also know that, at the end of the meal, nobody wants to break open the fortune ...
Simple and reliable network security for SMBs
When it comes to cybersecurity, what’s the difference between SMBs and large enterprises? If you guessed that the difference is related to the number of cyberattacks, then you’d be wrong. SMBs suffer ...
Cybersecurity & Coronavirus: Protecting Customers at Home
During these challenging times, when everyone is working, studying, and streaming from home, securing the home network is more important than ever. I’m co-producing a webinar about this, where you can learn ...
Automating Cyber-Defense
AI has potential to make the lives of security professionals a lot easier – but it should be approached with caution. Deep learning is a useful tool to optimize and validate security ...
Criminals Hacking CPUs to Mine Cryptocurrencies
Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing ...
A smarter approach to artificial intelligence and machine learning in mobile security
There’s a lot of talk these days about how artificial intelligence (AI) and machine learning will transform every industry, from agriculture (as CNN Tech recently reported) to zoo-keeping (as reported by the ...

