Predictor or Pitfall? Third Party Security Evaluators In case you haven’t heard, the use of 3rd parties to test the cyber hygiene of business partners and vendors Howard Taylor |January 05, 2023
Automating Incident Response The ongoing growth of enterprise IT and information security infrastructure calls for monitoring its security, managing incidents via specialized Security David Balaban |February 22, 2022
How to protect a corporate Wi-Fi network Initially, the use of Wi-Fi networks in companies was restricted to providing convenient Internet access at halls or conference rooms. David Balaban |February 02, 2022
How DDoS Attacks Are Different for Service Providers Service Providers – Enabling ServicesDigitalization has resulted in service providers taking on many new roles: consulting, communications, storage, processing, hosting, Shai Haim |August 11, 2021
How Cloud Native Technology will Impact 5G Mobile Networks Communication Service Providers (CSPs) are entering a new phase of network cloudification to transform their network infrastructure (NFV, SDN, AI, Yaniv Hoffman |August 05, 2021