Your Best Cyber Defense Against Ransomware and More? Understanding Your Enemy

From calculators to cloud to quantum, computing has changed the lives of billions of people for the better. But just as innovation can be a force for good, it can also help cyber criminals. Are you protecting your assets with end-to-end encryption? So are the criminals. Are you managing a distributed workforce with collaboration tools? […]

The post Your Best Cyber Defense Against Ransomware and More? Understanding Your Enemy appeared first on Security Intelligence.

Continue reading Your Best Cyber Defense Against Ransomware and More? Understanding Your Enemy

How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

In the world of telecom, a greenfield service provider is one where the deployment and configuration of its network are entirely new – where none existed before. In the USA, DISH is getting a lot of attention for its greenfield deployment of the nation… Continue reading How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

DDoS attacks and 5G: everything you need to know

Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of 114 other computers infected with a malicious script c… Continue reading DDoS attacks and 5G: everything you need to know

The top trends CSPs and enterprises will face in 2021 and beyond

Like most everyone else, our way of working has been significantly affected by the COVID-19 pandemic. Fortunately, one thing that can’t be stopped, even if it may have been slowed, is the rollout of 5G, which remains a high priority around the world. A… Continue reading The top trends CSPs and enterprises will face in 2021 and beyond

Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

The COVID-19 pandemic and governmental movement restrictions have led to an increased dependency on online services for individuals and businesses alike. Cybercriminals quickly identified this trend as an opportunity for gaining profits. They responded… Continue reading Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

Defending the Intelligent Edge from Evolving Attacks

Fortinet’s Aamir Lakhani discusses best practices for securing company data against next-gen threats, like edge access trojans (EATs). Continue reading Defending the Intelligent Edge from Evolving Attacks

Los Consumidores Mexicanos Esperan con Entusiasmo la Protección de la Ciberseguridad Basada en la Red

El 2020 está siendo un año difícil.  Mientras México se enfrenta a la pandemia de COVID-19, los ciudadanos también hacen frente a peligrosos virus y ataques informáticos que se propagan rápidamente por Internet. El virus humano ha provocado un crecimie… Continue reading Los Consumidores Mexicanos Esperan con Entusiasmo la Protección de la Ciberseguridad Basada en la Red

Is Telco Cybersecurity the New Competitive Edge for Service Providers?

In my 20+ years working for and with telecommunication providers around the world, I’ve witnessed firsthand how the industry has evolved to offer continuously improved services to a wide audience of consumers. One of the most amazing things about this … Continue reading Is Telco Cybersecurity the New Competitive Edge for Service Providers?

Bringing network stability and security back to businesses big and small

If you remember the pre-pandemic fun of dining out in a Chinese restaurant, then you probably also know that, at the end of the meal, nobody wants to break open the fortune cookie to read, “May you live in interesting times.” While seemingly a blessing… Continue reading Bringing network stability and security back to businesses big and small

Simple and reliable network security for SMBs

When it comes to cybersecurity, what’s the difference between SMBs and large enterprises? If you guessed that the difference is related to the number of cyberattacks, then you’d be wrong. SMBs suffer just as many cyberattacks as large enter… Continue reading Simple and reliable network security for SMBs