When Privacy and Security Collide

When Privacy and Security Collide

The US president, Barack Obama, attended a cyber security summit at Stanford University in Palo Alto, California in February. Around the same time he signed an executive order designed to encourage companies to share threat information with each other, and with the...
The Rise of Impersonator Bots-DDoS

The Rise of Impersonator Bots-DDoS

Distributed Denial of Service attacks are on the rise. At best it might mean your website is unavailable for a couple of hours. At worst, the most malicious can cost companies thousands upon thousands of dollars. Ofer Gayer, a security researcher writing for...
Past, Present & Future of BI Performance

Past, Present & Future of BI Performance

Improved business performance has been a promise of business intelligence gathering since forever. However it is in the last two decades that the technologies and processes have progressed to a point where they are genuinely beginning to help. While the advances in...
A 50-billion Device Security Headache

A 50-billion Device Security Headache

With the huge growth in mundane devices, everything from fridges to light bulbs, being connected and integrated with each other in the new ‘Internet of Things’ (IoT), the scope for hackers has grown right alongside with it. The new network has undoubtedly...
Succes of IAM

Succes of IAM

Identity and access management (IAM) is the cornerstone of cyber security when it comes to people and systems. It ensures that only approved people can access certain resources and systems. But what happens when you add the myriad of devices that are set to become...
The K.I.S.S Principle

The K.I.S.S Principle

The temptation with business intelligence, and especially with the amount of real-time information now present in the modern age, is the tendency to too much. However this excess of real-time data, far from giving us a complete view of a developing situation, can...