
The Expansion of Malware to the Cloud
As more organizations move their assets to the cloud, malware distributors are turning their attention to the cloud as well. In this blog, we will discuss the main malware types you may encounter in your cloud with examples and ways to detect and protect your cloud from them.
But first, how does malware find its way into cloud assets?

The Threat of Covert Channels in Network Time Synchronisation Protocols
Abstract: Synchronized clocks are vital for most communication scenarios in networks of Information Technology (IT) and Operational Technology (OT). The process of time synchronisation requires transmission of high-precision timestamps often originating from external sources. In this paper, we analyze how time synchronization protocols impose a threat by being leveraged as carrier for network covert channels.

Security Considerations in Choosing Cloud Data Platforms
Cloud security is more important than ever. Cybercrime is on the rise, and changes in the business world — the pivot to work from home — have made companies of all kinds more vulnerable to cyberattacks.
Data security has become a critical consideration for businesses migrating to the cloud or building a multi-cloud environment. It’s vital to know what to keep in mind when choosing a cloud data platform. Here are some things savvy companies should consider when making their selection.

The Top Security Challenges Data Centers Face in 2022
Data centers and providers employ some of the most sophisticated cybersecurity measures available to protect systems, hardware, and customer information. However, that does not mean

The Impact of Securing European 5G Mobile Networks
5G Mobile Networks are being rolled out throughout the world. We see new industries picking up 5G for their own purposes and bringing in new