11 May
04 May

Cyber Security Forecasts and Market Estimates for 2020

Cyber security now dominates the priorities of every organization as each adapts to a post-COVID-19 world. Remote workers identities’ and devices are the new security perimeter.

read more

Share this
27 Apr

7 Secure Video Chat Apps

Who knew that video-conferencing apps would become such a big part of everybody’s lives so quickly? People around the world have swiftly pivoted from IRL socialising to Zoom, Houseparty, FaceTime, Skype and all the other video-chat apps out there.

read more

Share this
13 Apr
06 Apr
30 Mar

What Are Rootkits and Rootkit Attacks?

If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of the most dangerous cyber threats today.

read more

Share this
23 Mar

How to Secure IoT Deployment During Talent Shortage

Businesses across industries are placing bigger and bigger bets on the Internet of Things (IoT) as they look to unlock valuable business opportunities. But there are concerns over the complexity of IoT security and its associated risks—to the company, its brands, and its customers. With the growing number and increased severity of IoT attacks, these organizations have good reason to be cautious.

read more

Share this
16 Mar

How One Attack Laid the Foundations for a Ransomware Invasion

Ransomware has been one of the most prolific cyber threats facing the world throughout 2019, and it’s unlikely to stop being a menace any time soon.

read more

Share this
02 Mar

5G: Can It Replace Home Broadband? – Part 2

— This is the second part of the article. You can catch up on the first part here.

T-Mobile’s campaign promise

While Verizon has to draw enough customers for each small cell site to recoup its costs, T-Mobile may be setting itself up for the opposite problem—too many subscribers downloading too much data on its promised home-5G service.

read more

Share this
24 Feb

5G: Can It Replace Home Broadband? – Part 1

When it comes to the possibility of home broadband competition, we want to believe. And in the case of 5G mobile broadband, wireless carriers want us to believe, too. But whether or not technological and commercial realities will reward that faith remains unclear. As with 5G smartphones, the basic challenge here sits at the intersection of the electromagnetic spectrum and telecom infrastructure economics.

read more

Share this

© 2017 Awontis. All rights reserved.