Galaxy Fold: Unveiling

5 Key Takeaways from #MWC19

MWC went by so fast that you may have missed some of the highlights. Luckily, we’ve compiled the following takeaways from the Barcelona conference. With apologies to Don Adams, it really is ...
Home Digital Asset Security

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a ...
5G: Big CSP “Security as a Service” Opportunity

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and ...
Home Router…, or Trojan Horse?

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store ...
Hacking concerns over connected toys

New research shows that consumers are willing to pay for IoT services

I’ve never really liked horror movies. They tend to give me the creeps. But I can’t help feeling that some of the scenes from those movie scripts are threatening to jump out ...
IoT - Funny video with serious message

What is the Internet of Things?

The Internet of Things (IoT) is the interconnection of everyday computerized devices linked through the Internet that enables them to send and receive data. IoT means different things to different people, and ...
Danger: VPNFilter Malware:

Danger: VPNFilter Malware:

Danger: VPNFilter Malware: What is it and how is network-based security best placed to thwart it? What’s this latest threat? A new malware threat has emerged that poses such a serious potential ...