Editorial

User behavior analytics – a promising tool in enterprise security
Editorial User behavior analytics – a promising tool in enterprise security

Acting as a cyber-security defense line, user behavior analytics (UBA) consist of monitoring the human behavior patterns that emerge from interacting with an IT system, establishing the normal zone and identifying any anomalies that could signal vulnerabilities or threats. This behavior-focused

Wireless jamming, a DDoS attack – how vulnerable are we?
Editorial Wireless jamming, a DDoS attack – how vulnerable are we?

Wireless or radio frequency wireless jamming designates the intentional activity of disrupting radio signals in order to disable any transmission that uses radio waves to circulate data or commands to and from RF devices. When used for malicious purposes, this wireless jamming is actually a DDoS

What do you know on the Dark Web?
Editorial What do you know on the Dark Web?

Let’s open our Dark Web discussion with a question: just how much of the entire Internet would you think is accessible via the usual search engines? Take a wild guess. We have conducted our own mini-inquiry based on this question, and the answers we received ranged from 20 to 40 percent. Well,

Privacy versus Web analytics – the “do not track” issue
Editorial Privacy versus Web analytics – the “do not track” issue

On June 15, 2015 the Consumer Watchdog group from Santa Monica, CA addressed a petition to the FCC regarding the way “edge” providers honor the “do not track request”. By “edge providers” the group has in mind entities such as Google, Facebook, YouTube, Pandora, Netflix, or LinkedIn. The “do not

Should encryption be limited or encouraged?
Editorial Should encryption be limited or encouraged?

The encryption debate reads the following way: while the logic of cyber-security and its encryption tools forecasts an impenetrable encryption, the government is worried that such an efficient cyber feature would block the law enforcers. Although creating a relative paradox, the diverging opinions

Smart Home Invaders – just how vulnerable are we?
Editorial Smart Home Invaders – just how vulnerable are we?

A survey on smart home and cyber-security, entitled “Behind our Digital Doors: Cybersecurity and the Connected Home”, revealed among other facts that 67% of the respondents possess between 1 and 5 Internet connected home devices, while 30% have 6 or more devices and 5% of households have 11 or more

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later