20

Oct2020
Even before the coronavirus pandemic and the changes it quickly forced on the way we work, IT managers and cybersecurity strategists had already observed a rise in Social Engineering, the latest cyber threat to businesses. The most critical of cyber dangers does not start with malware by any means. Instead, social ... Read More
October 20, 2020Tommi

05

Oct2020
The term "edge" alludes to bringing computing infrastructure closer to the origin of data. The distributed framework processes data near the originating data source conceivable to reduce latency and bandwidth use. Think of a self-driven car that needs to make multiple decisions at the same time, and most of which while ... Read More
October 5, 2020Chris Torbit

04

Oct2020
The widespread impact of the coronavirus pandemic has changed the way we all live our lives. Millions of people worldwide are now working virtually. Even before COVID-19, there had been debates about the future of working remotely. Now, there are more questions about “Business Unusual,” and if it has come ... Read More
October 4, 2020Chris Torbit

09

Oct2019
Ransomware - a new form of malware - is becoming an increased threat for businesses of every size. Ransomware is a version of malware that targets and encrypts a company's data and a ransom is demanded from the cyber criminals in order to obtain the decryption key to unlock our ... Read More
October 9, 2019Chris Torbit

24

Apr2019
There's a lot of buzz in IT circles, today, around the idea of "Intent Based Networking" or IBN. But what exactly is "Intent Based Networking" and how can it benefit today's modern organizations? Because of the significant advances in machine learning algorithms, intent based networking could soon be a reality in ... Read More
April 24, 2019Chris Torbit

18

Apr2019
No matter how much a company spends on technology and equipment, those solutions are not meant to last forever and have an anticipated lifecycle. Even after significant investments in technology in your organization, you may have noticed that those solutions are no longer as effective as they once were. Competitors ... Read More
April 18, 2019Chris Torbit

10

Apr2019
Penetration testing, also referred to as "pen testing" or "ethical hacking", is the process of testing a computer network, application or computer system to identify security issues that could be exploited by a cyber attacker. This testing is also referred to as a "white hat attack" because in a pen ... Read More
April 10, 2019Chris Torbit

03

Apr2019
DNS hijacking, also referred to as DNS redirection, is a specific type of cyber attack, wherein a "bad actor" can redirect queries to a domain name server, by overriding TCP/IP settings often by hacking and modifying a server's settings. DNS hijacking is frequently used for phishing - displaying fake versions ... Read More
April 3, 2019Chris Torbit

27

Mar2019
Machine Learning in business can help improve operations and provide meaningful insights on how customers and prospects are interacting with your company. AI (Artificial Intelligence) tools and numerous machine learning algorithms have become increasingly popular in the business community. Multiple factors, such as easy availability of complex data, less expensive ... Read More
March 27, 2019Chris Torbit

19

Mar2019
One of the most popular buzzwords in tech today is the "Internet of Things" (IoT) but what exactly is it referring to? This week, we'll explain the very basics of IoT and how it will continue to transform the way we communicate and conduct business in the 21st century. The phrase ... Read More
March 19, 2019Chris Torbit