DDoS: Most Important Hacker Tool in 2015

DDoS: Most Important Hacker Tool in 2015

The Internet is undoubtedly one of the greatest technological gifts humanity has ever seen. It has transformed society and the way we look at the world and communicate with each other; it’s been a boon to commerce and business. All of this is balanced, however,...
Cloud Services Comparison

Cloud Services Comparison

Business Intelligence used to mean massive overheads – caused by old-style data centers – consuming as much as 58% of the revenue received. Not any more: with a move to cloud computing these costs can be reduced drastically. Labor costs can be kept at 6%, while...
Growing ROI on Cloud Business Intelligence

Growing ROI on Cloud Business Intelligence

An ever-growing number of businesses are now choosing to run their mission-critical intelligence operations on the cloud. It is clear that it is now becoming a mainstream technology. For good reason too. It is increasingly superior, and proving to be a more than...
IoT is a New Backdoor for DDoS Attacks

IoT is a New Backdoor for DDoS Attacks

One of the more unorthodox and interesting ways that hackers can perform a DDoS attack is through the backdoor of millions and millions of improbable devices from Fridges to Coffeepots. Using the fast emerging Internet of Things (IoT) hackers can take control of vast...
DDos Attacks to Continue in 2015

DDos Attacks to Continue in 2015

It is clear that, in the preceding months, the sophistication and scale of DDoS attacks on vulnerable enterprises has increased rapidly. In the last year nearly double the amount of DDoS attack were recorded; half of which used sophisticated multi-vector attacks....
Measuring IT Security

Measuring IT Security

Data breaches seem to have been constantly in the headlines in recent years. This has caused many top level executives to ask this question of their information security officers: “How safe is our data?” In the rapidly evolving world of cloud computing and data...