No Longer Only A Fortune 2000 Solution

A cyber-attacker successfully breaks into your environment and begins sneaking around to find something valuable – intellectual property, bank account credentials, company plans, whatever. The attacker makes his way to a certain host on a network node to browse the directories, and suddenly, his connection is cut off. The stolen username and password he acquired…

North Korean Hackers Used ‘Torisma’ Spyware in Job Offers-based Attacks

A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims’ machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought. The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and defense contractors based in Russia…

November 2020 Guest Opinion: IoT Is Enabling a New Era of End-to-End Supply-Chain Monitoring & Actionable Analytics

November 2, 2020 LPWANs Help Realize Supply-Chain Monitoring’s Potential Real-time, transparent, and seamless tracking of assets, both indoors and out, while optimizing logistics and supply chains, has long been the focus of innovative companies around the globe. In early iterations, the connectivity used for asset tracking was either cellular or satellite. The objective was purely…

Fostering business productivity through cloud: A guide

Sponsored With the recent enterprise challenges brought by the Covid-19 pandemic, the workplace environment has evolved at a fast pace. The situation forced companies to go for digital solutions such as cloud for business continuity. Eastern Communications, a Philippine-based telecommunications company, believes that cloud has been defining the modern workplace and it is now dominating…