The Rise of Impersonator Bots-DDoS

The Rise of Impersonator Bots-DDoS

Distributed Denial of Service attacks are on the rise. At best it might mean your website is unavailable for a couple of hours. At worst, the most malicious can cost companies thousands upon thousands of dollars. Ofer Gayer, a security researcher writing for...
Past, Present & Future of BI Performance

Past, Present & Future of BI Performance

Improved business performance has been a promise of business intelligence gathering since forever. However it is in the last two decades that the technologies and processes have progressed to a point where they are genuinely beginning to help. While the advances in...
A 50-billion Device Security Headache

A 50-billion Device Security Headache

With the huge growth in mundane devices, everything from fridges to light bulbs, being connected and integrated with each other in the new ‘Internet of Things’ (IoT), the scope for hackers has grown right alongside with it. The new network has undoubtedly...
Succes of IAM

Succes of IAM

Identity and access management (IAM) is the cornerstone of cyber security when it comes to people and systems. It ensures that only approved people can access certain resources and systems. But what happens when you add the myriad of devices that are set to become...
The K.I.S.S Principle

The K.I.S.S Principle

The temptation with business intelligence, and especially with the amount of real-time information now present in the modern age, is the tendency to too much. However this excess of real-time data, far from giving us a complete view of a developing situation, can...
DDoS: Most Important Hacker Tool in 2015

DDoS: Most Important Hacker Tool in 2015

The Internet is undoubtedly one of the greatest technological gifts humanity has ever seen. It has transformed society and the way we look at the world and communicate with each other; it’s been a boon to commerce and business. All of this is balanced, however,...