Category:

Security

Top 4 Use Cases of Application Visibility and Control (AVC)

In today’s world when we seek for IoT, IoE, cloud computing, IaaS and various other things, being aware of application is a necessity. When we consider a network system to be deployed for home, enterprise or on a more global...

Top 4 Use Cases of Application Visibility and Control (AVC)
March 9th, 2017

Deep Packet Inspection – A Data Insight

Deep Packet Inspection (DPI) is a technology that allows software/hardware to access, analyze and modify payload (data) portions of network packets. Traditionally network operations like filtering, routing, accounting were based on L3/L4 layer (Network/Transport Layer) headers of the packet. But...

Deep Packet Inspection – A Data Insight
March 2nd, 2017

Ransomware- A Crafty, Dangerous Cyber Threat

Ransomware has been increasing at an alarming rate for over few years, and according to various sources it is estimated around $1 billion was made by cybercriminals. Today's technology has given much sophistication to hackers in getting access to your...

Ransomware- A Crafty, Dangerous Cyber Threat
February 28th, 2017

Fog Computing and its IoT Applications

What is Fog computing and why? Fog computing is also called as fogging which extends the cloud computing services to devices. It is a model where data processing can be done in the edges of networks instead of processing the...

Fog Computing and its  IoT Applications
February 28th, 2017

Top 6 IoT Security Threats

With the advent of connected cars, homes, wearables and many more, Internet of Things (IoT) gains momentum. The number of connected devices is expected to reach 50 billion by 2020. I have already discussed the wide scope of IoT in...

Top 6 IoT Security Threats
August 23rd, 2016

MEET OUR BLOGGERS

Follow Us

facebook twitter linkedin google plus youtube Glassdoor

Category

Recent Tweets & Comments

Tweets by @AltenCalsoftLabs