Protect your business from IoT Botnets


Gartner, Inc. forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. With the number of IoT devices dramatically accelerating, there is corresponding increase in the number of botnets and cyber-attacks. Also read – Secure IoT Platform A traditional botnet is a collection of compromised IT Systems (such as servers, network devices, … Continue reading Protect your business from IoT Botnets

Secure IoT Platform


Internet connectivity is a two-way street. With these devices becoming a gateway to our homes, workplaces, and sensitive data, they also become targets for attacks. Look around a typical household and consider what could happen when even the most mundane devices are compromised: a weaponized stove, baby monitors that spy, the contents of your refrigerator being held for ransom. We also need to consider that … Continue reading Secure IoT Platform

Cyber Security Defense in Depth Strategies


There is no silver bullet cyber security solution. According to Network Computing, defense in depth is: “The practice of layering defenses to provide added protection. Defense in depth increases security by raising the cost of an attack. This system places multiple barriers between an attacker and your business-critical information resources: The deeper an attacker tries to go, the harder it gets. These multiple layers prevent direct … Continue reading Cyber Security Defense in Depth Strategies

The digital world needs an “immune system.”


Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett is the CEO​ and Co-Founder​ of Chronicle. Stephen joined Chronicle from Google​, … Continue reading The digital world needs an “immune system.”

Future of Cyber Security with Connected Car Security


The way typical IT organization protects their critical assets with various security technology solutions such as two factor authentication, anti-virus protection, firewalls, intrusion detection systems, DDoS protections and many other technologies. The time has come now to shift the attention to other connected devices that are no more avoidable in everyone’s life Over the past few years, relevant government agencies have also produced reports and … Continue reading Future of Cyber Security with Connected Car Security

India to attract investment USD 100 billion in communication sector


India is the world’s second-largest telecommunications market, with over 1.2 billion subscribers as of September 2017. Availability of affordable smartphones and lower rates are expected to drive growth in the Indian telecom industry. With 70 per cent of the population staying in rural areas, the rural market would be a key growth driver in the coming years. The government of India has introduced Digital India programme under … Continue reading India to attract investment USD 100 billion in communication sector

Open Source Hardware – its Cost Reduction for many enterprise business


Large enterprise, cloud service providers, ‘big brand’ product companies are spending millions or billions of dollars in building their data center. So what do you think keeping these companies technology imperatives moving forward. Are they going to focus on hybrid controllers, traffic shaping, 100G, network modeling, network analytics and simulation, circuit automation and testing, backbone and edge traffic engineering, passive and active monitoring, configuration automation … Continue reading Open Source Hardware – its Cost Reduction for many enterprise business