Blog

This blog can originally found on blog.fortiumpartners.com By 2020, there will be 200 billion smart objects in the world, connecting everything from cars, planes and homes to medication, fitness devices and animals. Dependence on technology enriches our daily lives in countless ways, but what happens when technology fails? What happens when hackers and cybercriminals exploit vulnerabilities? The Economist…

Read more

While our hearts and minds are occupied with prayers and well wishes for the people of Texas, and our colleagues living and working in the area, we would also be remiss if we didn’t remind people of opportunists who will exploit this disaster for their own gain. In the past, after natural disasters, false charities…

Read more

It seems that what is proving so good for businesses, customers and users can sometimes hide many dragons. With all the value creation of digital business models – the connected ecosystems requires to conduct business instantly, bring more risk to the CISO. Cyber attacks are more frequent and more sophisticated with targets like smart phones,…

Read more

Without a trashed hotel room ever being reported to HR, skinny jeans worn to a client meeting, or providing free Quinoa-Fridays – we have achieved something ‘cool’ as a business this week. Each year, the largest analyst firm on the planet, Gartner, identifies new Cool Vendors considered innovative or transformative in key technology areas and…

Read more

Threat intelligence . . .  or as we like to call it, AED. AED is an acronym we‘ve coined, short for “Acquire, Enrich, Detect.” It describes the process we use internally to collect threat intelligence and actualize our ability to identify when networks are under attack. We do this in the shortest possible time, with the…

Read more

Originally posted at ITWatchIT.com IoT Devices and Mobile Security IoT is a very scary environment, and we have only seen the tip of the iceberg. We operate in the area of secure communications and we operate IPsec for the reason that people can’t break it, as opposed to SSL/TLS, where people can do man-in-the-middle attacks. If…

Read more

Originally published at CMO.com on May 17, 2017 From Amazon’s robotic vacuum to robot toys that teach coding, there are now 6.4 billion web-enabled objects (and counting) streamlining even the smallest of everyday activities. For marketers, the Internet of Things (IoT) offers huge potential—of the 62% U.S. adults owning at least one connected device, half of…

Read more

We recently read this article from CNN Tech, titled “Please stop charging your phone in public ports”, and had a few follow up questions for our Head of Applied Research, Sam Stover and Lead Developer, Michael Jarvis. This warning is not a brand new revelation and researchers at Kaspersky Labs found in May 2016 that they could install a third-party application,…

Read more

We live in a global network of connected people. Each and every day we log in or reach out to various sources, across a variety of devices to drive our lives forward. This behavior is redefining the network perimeter as ‘edgeless’, creating a massive security conundrum for businesses attempting to embrace the mobile workforce. BYOD…

Read more

Enter your details and we’ll get back to you