by Shlom | Jun 12, 2017 | Uncategorized
Antique, vintage, throwback. These words are often used in today’s world to refer to objects that are cool, steady or unique. However, when it comes to software these are the last things you want. This blatant security risk may seem obvious, and no one likes to...
by Shlom | Jun 12, 2017 | Uncategorized
For years, patch management has been a thorn in the side of organizations and continues to be a popular topic of discussion. Management of an organization’s security is an increasingly critical aspect of the modern business. Technology continues to evolve and...
by Shlom | Jun 12, 2017 | Uncategorized
Attacks and raids on private company data are commonplace these days. The easiest way into a company is often for would-be fraudsters to find a disgruntled employee who can leak data. Indeed, this has been the case with several high profile data leaks in the past....
by Shlom | Jun 12, 2017 | Big data, Uncategorized
Stories in the media regarding the latest disturbing news about advanced persistent threats (APTs) are now a common sight, affecting well-known institutions, companies and government agencies. The frequency of these threats highlights that even the best IT network...
by Shlom | Jun 12, 2017 | Uncategorized
The use of data to tackle incoming threats is nothing new, and basic intrusion detection systems that monitor suspicious activity within a network have been around for at least three decades. However, during this time data volumes have increased exponentially, and...