Could most cyberattacks be easily countered by companies?

October is cybersecurity month. On this occasion, consultants, specialists and other actors are pushing cybersecurity and its data to the forefront. In Europe, consulting firm Wavestone, recently presented conclusions of its study dedicated to incidents encountered by companies in this area. With one observation: pirates, whose primary motivation remains financial gain, have limited technical capabilities. [...]

The Top Application Security Threats (And How To Counter Them)

Application Security is the use of software, hardware, and procedural methods to protect applications from external threats. In the world of software design, security is becoming an increasingly important concern during development as applications are more accessible over different networks and as a result, are more vulnerable to a wide variety of threats. Many applications [...]

Huawei, technology, purpose, and the path to a fully connected world

"Harnessing the Power of Connectivity”. With wireless connectivity as the foundation of growth, as recently demonstrated by the findings from Huawei’s Global Connectivity Index (GCI 2017). Policy makers who aggressively invest and proceed to necessary adaptations "in ICT Infrastructure should find that their nation can achieve economic growth and succeed with niche market business opportunities based on [...]