By Rick Holland, VP Strategy at Digital Shadows

 

What we know about the Equifax breach

By Alastair Paterson, CEO and Co-Founder, Digital Shadows

 

I’ll venture to guess you’re using a mobile device to read this. In a recent Ericsson Mobility Report, the total number of mobile subscriptions at the end of 2016 was approximately 7.5 billion and growing around 4 percent year-on-year.  Greater speed, power and storage capabilities of mobile devices means they are used more frequently for activities previously reserved for laptops or PCs.

By Aaron White, Regional Director for Sage Middle East

 

On 1 January 2018, value-added tax (VAT) will come into effect for the first time in United Arab Emirates. Naturally, small businesses are concerned about the financial and operational impacts of VAT compliance, especially since they’re used to operating in a low-tax business environment.

By Rick Holland, VP Strategy at Digital Shadows

 

Exploit kit activity is waning. Collectively these malware distribution tools used to be a prominent method of infection. They rely on compromised websites, malicious adverts and social engineering to direct web traffic to their landing pages and attempt the exploitation of vulnerable software. Operated by various actors and groups, exploit kits possess different features, use various exploits and distribute different malware to victims. Since June 2016 at least four of the major players in this area ceased to be active. In this blog, I wanted to explore which exploit kits are still around and propose some plausible scenarios for the future of the exploit kit landscape.

By Brian Gammage, Chief Market Technologist for End-User Computing at VMware

 

The Middle East’s shift to digital business has created a dilemma for the regions CIOs. They need to innovate and implement change, while also retaining levels of control and management.

By Matthew Gardiner, Senior Product Marketing Manager, Mimecast

 

Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s research team, turns that assumption on its head, undermining the security and non-repudiation of email; even for those that use SMIME or PGP for signing.  Using the ROPEMAKER exploit a malicious actor can change the displayed content in an email at will. For example, a malicious actor could swap a benign URL with a malicious one in an email already delivered to your inbox, turn simple text into a malicious URL, or edit any text in the body of an email whenever they want. All of this can be done without direct access to the inbox.

By Alastair Paterson, CEO and Co-Founder, Digital Shadows

 

We’ve all heard the phrase: “When one door closes, a window opens.” You can bet that as you’re reading this, those engaged in cyber crime on the dark web are looking for that next ‘market place window’ to open.

By Alexander Rauser, CEO and Founder of Prototype.

 

Digiculture – the perfect term to describe the culture today’s world lives in.

Tuesday, 15 August 2017 06:22

Setting Your Data Center Migration Strategy

Written by

By Sachin Bhardwaj, Director Marketing & Business Development, eHosting DataFort

 

Change, even one for the better, comes with risk. Migrating to a Colocation Data Center - or any new Data Center- should be accompanied by careful supervision and a well devised and executed strategy. Data and IT functionality are a critical element of any modern enterprise. While adopting a new Data Center strategy holds the promise of efficiency and leaner ongoing costs, the transition can also result in negative disruptive outcomes – if it is enacted badly.

By Rick Holland, VP Strategy at Digital Shadows

 

The law enforcement operations that took down the AlphaBay and Hansa marketplaces were meant to strike a sizable blow to the online trade of illegal goods and services. Frequenters of these services might now think twice before placing their trust in these unregulated platforms, and there may well be further arrests to follow as investigations and analysis into the materials seized in these raids run their course.

Page 12 of 15