Cybersecurity & Coronavirus: Protecting Customers at Home

During these challenging times, when everyone is working, studying, and streaming from home, securing the home network is more important than ever.   I’m co-producing a webinar about this, where you can learn more about the growing threat la… Continue reading Cybersecurity & Coronavirus: Protecting Customers at Home

New IoT security regulations: what you need to know

(written with Lena Fuks) Over the past few years, the Internet of Things (IoT) market has been experiencing explosive growth. According to Gartner, there will be 25 billion connected devices by 2021. Statista research suggests the total installed … Continue reading New IoT security regulations: what you need to know

Why CSPs Should Care About Phishing

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what th… Continue reading Why CSPs Should Care About Phishing

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in rever… Continue reading Home Digital Asset Security

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabil… Continue reading 5G: Big CSP “Security as a Service” Opportunity

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us … Continue reading Home Router…, or Trojan Horse?

IoT Cybersecurity Challenges and Solutions

What Exactly Is the Internet of Things? The Internet of Things (IoT) is simply an interconnected array of electronic devices that are linked by the Internet, through which they can transmit and receive data. The original “thing” was a Coca … Continue reading IoT Cybersecurity Challenges and Solutions

What is Fileless Malware?

Fileless malware is a form of cyberattack where the malicious software that enters your computer system resides within volatile storage components such as RAM. It is distinguished from traditional memory-resident malware that generally required access … Continue reading What is Fileless Malware?

New research shows that consumers are willing to pay for IoT services

I’ve never really liked horror movies. They tend to give me the creeps. But I can’t help feeling that some of the scenes from those movie scripts are threatening to jump out of the screen and impact our everyday lives. It’s true that … Continue reading New research shows that consumers are willing to pay for IoT services