Andrew Heikklia

Mitigation Security

Repeat After Me… Nobody Is Safe From Cyber Attacks

December 1, 2017

Nobody Is Safe From Cyber Attacks The last couple of years have shown the world that seemingly nobody is safe from cyber attacks. The 2017 breach of Equifax was proof that now, even the common person should begin paying attention to

Read More
Shadow It Management

How to Make the Move to the Cloud Securely

March 29, 2017

Move to the Cloud Securely The 2016 Enterprise Cloud Computing Survey from IDG offers multiple interesting insights concerning the state of cloud adoption in 2017. According to IDG, 70 percent of the survey’s respondent organizations have at least one application

Read More
Rakesh Soni
Customer Experience: Living In A Connected World and Winning the IoT Race IoT and smart interconnected systems have already created an invisible aura of convenience, usability, and a rich user experience around us. However, when ...
Smart contract
What Is A Smart Contract? Traditional contracts In order to understand what smart contracts are and how they can be used, we should first define what a traditional contract is. A contract can be broadly ...
Mitigation Security
Data scraping solutions When people hear the term data scraping, their first thought is often about how companies use this technology for competitive reasons – specifically to pull publicly-available data from millions of websites in ...
Gary Bernstein
Intruder Vulnerability Tool Alternatives There are many Intruder alternative names on the market, but which one is the best for your cloud security needs? Intruder is a popular web application security testing tool, and it ...
Derrek Schutman
Building a Digital Enablement Layer Most Digital Service Providers (DSPs) aim to provide digital capabilities to customers but struggle to transform with legacy O/BSS systems. According to McKinsey research, 70% of digital transformation projects don’t ...