8 Online Shopping Security Tips for Cyber Monday

As the online equivalent to Black Friday, Cyber Monday is among the biggest online shopping days of the year. Cyber Monday, along with Black Friday, heralds the beginning of the online holiday shopping season. According to Adobe Analytics, 2018 Cyber M… Continue reading 8 Online Shopping Security Tips for Cyber Monday

5 Ways to Avoid a Ransomware Attack

“Ooops, your files have been encrypted!” That’s the dreaded message that greeted people hit with the 2017 WannaCry ransomware attack. Hundreds of thousands of computers were infected and many people lost their computer files, mon… Continue reading 5 Ways to Avoid a Ransomware Attack

What is the CIA Triad: Confidentiality, Integrity, & Availability

Visibility & Control: The keys to the kingdom of information security and network function integrity   Ask any security practitioner how to start designing network infrastructure for security and they will tell you that the guiding principle t… Continue reading What is the CIA Triad: Confidentiality, Integrity, & Availability

Cybercrime – When Consumers Feel Like Victims, Operators Come to The Rescue

Yes, it’s unfortunate, but it’s often been said that there are two types of cybercrime victims – those who have fallen prey to the wily ways of cyber criminals, and those who haven’t… yet.  Instant messaging, mobile a… Continue reading Cybercrime – When Consumers Feel Like Victims, Operators Come to The Rescue

Why CSPs Should Care About Phishing

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what th… Continue reading Why CSPs Should Care About Phishing

Telegram Hit by Powerful DDoS Attack – Blames China

Rich Irony – Secure Messaging App Neutralized by Cyber Attack We live in a world where foreign governments are routinely accused of cyber meddling to subvert democratic elections. Is anyone surprised that an authoritarian government is blamed for… Continue reading Telegram Hit by Powerful DDoS Attack – Blames China

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in rever… Continue reading Home Digital Asset Security

Top 12 Allot Blogs of 2018

Top 12 Allot Blogs of 2018 With 2018 behind us, and 2019 picking up momentum, we thought you might be interested to see a list of the Top 12 Allot Blogs of 2018. We hope that you can find the time to read through this cyber compendium—you never k… Continue reading Top 12 Allot Blogs of 2018

IoT Cybersecurity Challenges and Solutions

What Exactly Is the Internet of Things? The Internet of Things (IoT) is simply an interconnected array of electronic devices that are linked by the Internet, through which they can transmit and receive data. The original “thing” was a Coca … Continue reading IoT Cybersecurity Challenges and Solutions

Six ‘Lessons Learned’ For Mitigating DDoS Attacks

The world of DDoS is dynamic and evolving. So, when considering the most important features that a DDoS Mitigation should have, it’s always worth examining them in light of recent trends and applying some lessons learned. That, however, can be a … Continue reading Six ‘Lessons Learned’ For Mitigating DDoS Attacks