Category:

IT Security

How to Prevent your System from Ransomware WannaCry Attacks?

Over the course of Friday , 12th of May 2017 we noticed multiple reports of organizations across multiple verticals being victim to a ransomware attack. Ransomware is a type of malware that prevents or limits users from accessing their system,...

How to Prevent your System from Ransomware WannaCry Attacks?
May 15th, 2017

Invisible Phishing Attack

Invisible phishing attack is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels. An Information...

Invisible Phishing Attack
May 3rd, 2017

Use Cases of Blockchain in IoT

IoT has been successfully proving itself in enterprises that has adopted it. Generally, all IoT devices even the nearby ones are connected to each other over the centralized internet. The diversity of ownership between cloud and IoT devices, brings complications in device to...

Use Cases of Blockchain in IoT
April 26th, 2017

Top 4 Use Cases of Application Visibility and Control (AVC)

In today’s world when we seek for IoT, IoE, cloud computing, IaaS and various other things, being aware of application is a necessity. When we consider a network system to be deployed for home, enterprise or on a more global...

Top 4 Use Cases of Application Visibility and Control (AVC)
March 9th, 2017

Deep Packet Inspection – A Data Insight

Deep Packet Inspection (DPI) is a technology that allows software/hardware to access, analyze and modify payload (data) portions of network packets. Traditionally network operations like filtering, routing, accounting were based on L3/L4 layer (Network/Transport Layer) headers of the packet. But...

Deep Packet Inspection – A Data Insight
March 2nd, 2017

MEET OUR BLOGGERS

Follow Us

facebook twitter linkedin google plus youtube Glassdoor

Category

Recent Tweets & Comments

Tweets by @AltenCalsoftLabs