Expert Views Security Hackers can force locked iPhones to make contactless payments Amer Owaida, Security Writer at ESET highlights the flaws in Apple Pay and Visa could allow criminals to make arbitrary...
Expert Views Ways to keep your kids smartphone secure Smartphones are kids’ trusty companions both in- and outside the classroom, and as they return to their desks. Amer Owaida, Security...
Expert Views Howard University suffers cyberattack Amer Owaida, Security Writer at ESET highlights that the Howard University suffered a ransomware attack, however there is no evidence...
Expert Views Use of single‑factor authentication comes with cybersecurity risks Amer Owaida, Security Writer at ESET explains that Cybersecurity and Infrastructure Security Agency (CISA), the federal agency in the USA...
Expert Views Security Securing devices in the hybrid workplace Phil Muncaster, guest writer at ESET explains that as employees split their time between office and off-site work, there’s a...
Expert Views Networking How partners can maximize on opportunities for SD-WAN and benefit... Simon Pamplin, Chief Technologist WAN Edge EMEA at Aruba Silver Peak, a Hewlett Packard Enterprise company, explains how partners can...
Expert Views A new way to evaluate HCI market Tonya Chin, SVP Corporate Marketing and IR, and Chief Communications Officer at Nutanix, explains how Nutanix has asserted its position...
Expert Views Deepfakes becoming indistinguishable from reality Tony Anscombe, Chief Security Evangelist and Cameron Camp, Security Researcher at ESET explains that as deepfakes become indistinguishable from reality...
Data Center Expert Views Data Center of the Future As expectations grow from data centers due to pandemic driven digitalization and transformation, bridging the vast number of sub-systems is...
Expert Views List of most exploited vulnerabilities revealed Amer Owaida, Security Writer at ESET explains that there are 30 vulnerabilities listed in total; organizations would do well to...