Secure Network Protocols
Network security is an important topic in a world where most corporations have an on-line presence and billions of dollars of e-commerce is transacted daily. Technologists need to have an …
Network security is an important topic in a world where most corporations have an on-line presence and billions of dollars of e-commerce is transacted daily. Technologists need to have an …
There are serious privacy concerns with the forthcoming Australian census.
[Ransomware](https://en.wikipedia.org/wiki/Ransomware) is a real and growing threat. Although it has been around for many years, it is only more recently that ransomware has become more prominent.
Legacy server protocols can be dangerous, particularly those which were once widely used and are no longer well known. Why do these legacy protocols present a danger?
There are many uncertainties regarding the UK's recent referendum vote to leave the EU.
We only just discussed the growing threat of ransomware - cyberattacks where victims' data is encrypted by attackers and they must pay a fee to have their data decrypted.
One aspect not discussed in [our recent post](http://enterprisedt.com/blogs/discussion/security-and-the-internet-of-things/) on security issues and the _Internet of Things_ (IoT) is the increasing trend of connecting _operational technology systems_ to the internet.
The massive _account takeover attacks_ reported by Akamai recently illustrate what corporations are up against when it comes to cyberattacks.
You might remember the infamous Jeep hack last year, in 2015. In a scary demonstration, Charlie Miller and Chris Valasek demonstrated their ability to remotely control almost everything, including steering and braking.
Unfortunately, security and privacy are not necessarily high priorities for many technology companies. There are also the issues of licensing and supply of services, which come down to vendor trust.