What is the Role of an Infrastructure Management Service (IMS)?

IT infrastructure management service (IMS) is about administering and managing technology, information and data in a proactive way. Its scope ranges...

The Top 5 Challenges Faced by UK Businesses

If like many UK businesses, you’re an SME running on stretched resources and time, chances are you’re more focused on making a profit than you are on...

Tech 5 - Samsung's latest iPhone rival, summer-school hackathons and the demise of the fax machine

Take note of the Samsung Note 9

With an enormous 6.4-inch screen and an S Pen full of wizardry, committed Android users might just be tempted by...

How statistics-based attacks work

Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a...

iOS vs Android - The mobile security wars

We all have our own preference. Whether you’re a loyal Apple customer, or you’ve never been tempted to put distance between your thumbs and your...

How do signature-based attacks work?

Recently, whilst delving under the bonnet to find out what firewalls really do I came across the unforgettably-named Ping of Death signature-based...