The path towards virtualize networks
In order to take advantage of network capabilities and to improve efficiencies and response times in enterprise managed security services, network virtualization becomes an optimal security solution (vNSF or Virtualized Network Security Function). This is achieved...Continue reading »
Although it sounds a little extreme, it seems that taking all sorts of security measures with our smartphones and other devices isn’t actually enough. We cannot know if our data and passwords will be exposed to the next security breach,...Continue reading »
It’s almost impossible to think of a world without connected devices. In the same way that the time before the mass availability of mobile phones feels like the dark ages, the idea of living ‘off grid’ without being online for...Continue reading »
If there’s one technological innovation that’s particularly popular right now, it’s the drone. They’re being used by the military and security organisations to protect us, by amatuer photographers to take fabulous photos, and by children to have a bit of...Continue reading »
Amidst an era-defining debate about personal data, many studies have emerged to suggest that around the world, people are increasingly concerned about privacy. One study even claims that fear for privacy is on a par with global terrorism and economic...Continue reading »
Sweat pouring down their faces. Trying to hide, trying to seek. Fighting to be faster, stronger, smarter. To save the world or to just survive.
Down to the wire, the Cyber Padawans place their last flag and leap to victory! That’s...Continue reading »
Although many of us will not care to admit it, we are finding it more and more difficult to leave work at the office. From a quick check of emails on the bus at the end of the day to...Continue reading »
Biometrics are already a part of our lives. Maybe not to the level of spy movies, but not that far behind. We use our fingertips to start our cars, flashes of our faces unlock our phones, even our handprints allow...Continue reading »
There’s no doubt that your identity is becoming your most valuable asset, on- or offline.
To risk it is to risk your income, reputation, business, credit and personal lives. And yet, each day we blindly authorize it away. That’s precisely why...Continue reading »
By Jennifer Riggins (@jkriggins), Contributor
13 April 2015: You insure your house and your car, but do you need cyber insurance coverage to insure your life online? Can it protect you in case of the next hack or cyber attack?
It seems like...Continue reading »