Blog
By Brad Ree
With the burgeoning market of the Internet of Things expected to have 24.1 billion active IoT devices come 2030, the world as we know it will only continue to grow more connected. Through a constant stream of new and innovative products across items like smart speakers, wearables, and connected appliances
Using replication technology to ensure cloud-based IoT security can be maintained at scale
May 21, 2020
0 Comment
By Dennis Monner
How long can today’s cloud security systems cope with the growing mass of connected devices and users, the continued expansion of the IoT, and the expectation that remote workforces will become a permanent trend? In theory, cloud security systems can scale indefinitely, but the evidence is that there comes a
By Vishal Chawla
There are millions of open cybersecurity jobs, and professionals can make a lot of money working in cybersecurity. Many companies are grappling to find enough qualified people to assist in building intelligent cybersecurity frameworks. The difficulty of adequate cybersecurity skills has become clear in the last five to ten years
By Charles Eagan
Malware, phishing and ransomware are constantly keeping security teams on their toes. But there is one risk to data security that cannot be stopped by cybersecurity software: human error. Unlike malicious threat actors, human error doesn’t come and go as trends in the cyber landscape change. It is true of data
By Eyal Benishti
Over the past decade, the financial losses associated with cyberattacks have been devastating to organizations, municipalities and small businesses. In just three years, business email compromise (BEC) has cost organizations more than $26 billion, driving a global law enforcement movement called “Operation reWired” into action that specifically focused on disrupting




