by Shlom | Jun 12, 2017 | Uncategorized
The US president, Barack Obama, attended a cyber security summit at Stanford University in Palo Alto, California in February. Around the same time he signed an executive order designed to encourage companies to share threat information with each other, and with the...
by Shlom | Jun 12, 2017 | Uncategorized
Distributed Denial of Service attacks are on the rise. At best it might mean your website is unavailable for a couple of hours. At worst, the most malicious can cost companies thousands upon thousands of dollars. Ofer Gayer, a security researcher writing for...
by Shlom | Jun 12, 2017 | Uncategorized
Improved business performance has been a promise of business intelligence gathering since forever. However it is in the last two decades that the technologies and processes have progressed to a point where they are genuinely beginning to help. While the advances in...
by Shlom | Jun 12, 2017 | Uncategorized
With the huge growth in mundane devices, everything from fridges to light bulbs, being connected and integrated with each other in the new ‘Internet of Things’ (IoT), the scope for hackers has grown right alongside with it. The new network has undoubtedly...
by Shlom | Jun 12, 2017 | Uncategorized
Identity and access management (IAM) is the cornerstone of cyber security when it comes to people and systems. It ensures that only approved people can access certain resources and systems. But what happens when you add the myriad of devices that are set to become...
by Shlom | Jun 12, 2017 | Uncategorized
The temptation with business intelligence, and especially with the amount of real-time information now present in the modern age, is the tendency to too much. However this excess of real-time data, far from giving us a complete view of a developing situation, can...