Blog

Updating your main database: your brain

  • All
  • Cybersecurity
  • Network Management
  • Big Data
  • Open Source
  • Startup
  • RBCSIRT
  • Malware

January 19 2017

What WhatsApp's end-to-end encryption means for your cybersecurity

Last year, popular mobile messaging application WhatsApp introduced end-to-end encryption for all messages sent and received over its servers. While this sounds great on the surface, few of its users know what exactly this means for their data security and how it's different from the company's previous system.

  Read more
Cybersecurity

January 18 2017

How to ensure that your API endpoints are secure

Application programming interfaces (APIs) are increasingly utilized by businesses to add value to their services and increase potential revenue streams. For businesses that subscribe to Software as a Service (SaaS) and Platform as a Service (PaaS) packages, APIs add a further dimension to the services that can cater for specific needs and requirements.

  Read more
Network Management

January 11 2017

Why CIOs are at the forefront of cybersecurity

The role of Chief Information Officer (CIO) is constantly evolving. In the latter half of the twentieth century, when companies first started using computer technology to store and manage information, the CIO was primarily responsible for managing this internal technology and advising the CEO on technology investment decisions.

  Read more
Cybersecurity

January 11 2017

What sysadmins can do with the redborder platform

Our redborder platform offers system administrators everything they need to keep their network running smoothly and securely. But in the fast-paced and tumultuous business environments of today, that alone is simply insufficient for a long-term network solution. Because the redborder platform is based on open source and big data technology, it can offer sysadmins so much more. Furthermore, it's flexible and customizable enough to adapt to a business's unique needs. In this blog post, we'll outline what sysadmins can do with the redborder platform and why it's perfect for the modern business setting.

  Read more
Network Management

January 05 2017

The four biggest cybersecurity threats of the next decade

People have become increasingly dependent on technology in practically every area of their lives. As such, cybersecurity is now a fundamental part of safety and security, with cybercrime posing a threat to businesses, governments, financial institutions, and every digital aspect of our private lives.The more we know, the better we can protect ourselves. Looking to the future, here are four of the biggest threats to cybersecurity we're likely to see in the coming decade.

  Read more
Cybersecurity
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read more