Editorial

Network monitoring tools: take a walk down this lane for some of the best options
Editorial Network monitoring tools: take a walk down this lane for some of the best options

Any network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The continuous network

Will cognitive cyber-security one day protect your data?
Editorial Will cognitive cyber-security one day protect your data?

Cognitive computing simulates the human thought process in an artificial intelligence (cognitive) environment. Teaching a computer how to use the type of unstructured information usually employed by security analysts requires tools such as data mining, pattern recognition, human-computer

Hybrid cloud considerations: do you see enterprises being thrilled?
Editorial Hybrid cloud considerations: do you see enterprises being thrilled?

When two or more clouds (public, private) are bound together, although they remain distinct, a cloud service is called hybrid cloud . The connection between the two or more distinct clouds can concern the location, the dedicated resources or simply the cloud services, allowing aggregation,

Stopping online advertising fraud once and for all
Editorial Stopping online advertising fraud once and for all

In late 2014 the American Association of Advertising Agencies (4A’s), Association of National Advertisers (ANA), and Interactive Advertising Bureau (IAB) created the New York-based Trustworthy Accountability Group (TAG) for the purpose of “eliminating fraudulent digital advertising traffic, com

Help improve safety in case of power grid cyber-attacks!
Editorial Help improve safety in case of power grid cyber-attacks!

The December 2015 Ukraine cyber-attack that took control of the Prykarpattyaoblenergo Control Center (PCC) in the Ivano-Frankivsk region serves as study-case for all cyber-security researchers concerned with possible similar incidents in the US. The said APT attack was performed via a malware

How DARPA crushed the hopes for touch-based authentication
Editorial How DARPA crushed the hopes for touch-based authentication

Smartphones head towards touch-based continuous authentication – a type of permanent identity validation that is also passive, since it does not hinder in any way other human-phone interactions that may be taking place during the same time. That would eliminate the risks of intrusion currently at t

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later