Blogs

The real advantage of moving your security controls to the cloud

It is not exactly news that most security controls, particularly those that are traditionally thought of as network-centric ones (versus endpoint-centric ones), are moving to the cloud. Many think that this is occurring...

What you can learn from recent cyber attacks targeting school systems

Just after the school year commenced, Steve Bradshaw, superintendent of the Columbia Falls, Montana, schools got a menacing text from a number he didn’t recognise. The cyber thug behind the message made a myriad of t...

Apple teams up with GE to make industrial IoT apps for iOS

Device giant Apple is partnering with GE in an apparent bid to give both companies a leg up in the industrial IoT space. GE’s industrial IoT platform Predix is being given its own SDK for iOS to enable developers to m...

Dmitry Leus comments on cryptocurrency and blockchain technology

Writing this week for EU Today, Dmitry Leus of East West Connect commented that: “Much has been made this last weekend of the news that Bitcoin broke the $6000 price barrier, sparking new attention for...

City of Aberdeen paves the way for 5G

Aberdeen, Scotland’s third largest city, is known as the Energy Capital of Europe. With a population of more than 229,000 and an economy that brings in 15 percent of Scotland’s gross domestic product (GDP), Aberdeen is ...

The 5 most common router attacks on a network

Unfortunately, router attacks cannot be 100 percent prevented, but there are a few things that you can be doing to prevent one of the most common router attacks from occurring on your system and network. Large...