(Ghostwritten for Dale Schembri) Smart devices are becoming commonplace, and not just for personal use. IDC estimates that by 2025, there will be at least 41.6 billion smart devices connected to the Internet and that figure is getting closer every day – reaching more than 10 million in 2021 already. Multiple sources report that 83% … Continue reading Hacking smart devices – the silent threat
(Ghostwritten for Sean Cohen) Our DDoS partner NETSCOUT recently published the NETSCOUT Threat Intelligence Report Issue 7, covering the first half of 2021 and analyzing the DDoS landscape and related threats. Similarly, our connectivity partner, Telia Carrier, released the DDoS Threat Landscape Report 2021, which covers all of 2020. The general result of both these reports … Continue reading The Current DDoS Threat Landscape – Will It Ever Get Better?
(Ghostwritten for Ivan Galea) The more we move to the cloud, the more we are getting used to the fact that the cloud providers relieve us of many responsibilities. Such an approach has its pros and cons. A cloud provider is certainly able and willing to provide many services that would otherwise consume your IT … Continue reading 5 reasons why you should not rely on SaaS provider backup solutions
(Ghostwritten for Steven Paton) In 1950, one of Britain’s most famous mathematicians, Alan M. Turing, proposed a test that could be used to evaluate artificial intelligence. In this test, a human judge observes a simple text conversation between two parties, knowing that one is a human and the other one is a machine but not … Continue reading The CX-Virtual Agent – Am I Really Not Talking to a Human?
(Ghostwritten for Jack Mizzi) On October 4, 2021, the social media giant Facebook, along with its services Instagram and WhatsApp, experienced a major outage that lasted several hours, sending both social media enthusiasts and, more importantly, businesses relying on social media into a state of panic. “Was it a malicious hacker attack? Is Facebook down for good?” … Continue reading Understanding the Facebook Blackout
(Ghostwritten for Dale Schembri) Some businesses leave their data completely unprotected and never lose it. Some people run across eight lanes of the Marsa bypass in the rush hour and reach the other side unharmed. In both cases, it’s a matter of calculating whether the cost of acting safely is worth it when compared to … Continue reading How safe is your data?
(Ghostwritten for Ivan Galea) Today, any business can become a victim of a DDoS attack. In the past, such attacks were mostly associated with social unrest, electronic warfare, and large organisations. Today, with the growth of the dark web, DDoS attacks have become an illegal service offered by criminal organisations to clients of all sizes. … Continue reading DDoS Attacks – Are You Prepared?
(Ghostwritten for Jack Mizzi) Many great inventions around the world occur as a result of crises. Wars have powered the development of technology, bringing us airplanes. Plagues accelerated the development of medicine, resulting in major drug advancement. After any crisis, the winners tend to be those who see all these changes as an opportunity rather … Continue reading New norm or new opportunity?