previous arrow
next arrow
Slider

Blog

By Esther Shein

Without regulation and strong proactive measures, 5G networks remain vulnerable to cyberattacks, and the responsibility falls on businesses and governments. Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million

By Lee Sustar

For anyone who’s made it through the twin expo floors at the annual RSA Conference – past the big-name vendors with magicians, fast-talking comedians, flashy free gadgets and weighty swag bags – you’ll find a collection of startup booths with basic brochures, big ideas and an intriguing demo. But will

By BRIAN FINCH

In 1983 computer science Ph.D. student Fred Cohen developed a novel software program that would surreptitiously install itself on host computers and quietly surrender all rights, privileges, and data to Cohen. Upon seeing the extraordinary success of the software after it was tested on university computers, Professor Len Adelman commented

By Danny Palmer

Artificial intelligence and machine learning tools could go a long way to helping to fight cybercrime. But these technologies aren’t a silver bullet, and could also be exploited by malicious hackers. 2020 has started as 2019 ended, with new cyberattacks, hacking incidents and data breaches coming to light almost every

By Ben Watford

An arms race — unseen, digital and all too little understood — is raging. The UK’s chief of the defence staff, Nick Carter, recently stated that “the risk of cyber warfare with Russia is now a greater threat than terrorism”. Companies are fighting to adapt to a reality where “hacktivists”,

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.