Author: Alon Saban

Secure edge. Illustration
5G Security

Securing the Edge

Edge computing – importance and functions: Of all computing paradigms, edge computing is the fastest growing. According to a Gartner report, “around 10% of enterprise-generated

Read More »
Cyber Security

Gaining immunity to privilege escalation

Many cybersecurity attacks these days are characterized by a stealth approach by hackers. The methods of gaining initial admission to a system are well-known. These include zero-day exploits, IT misconfigurations, coding errors and bugs, installation of malware by careless clicks or unauthorized hardware, phishing, social engineering, or brute force cracking of passwords.

Read More »