How to Optimize Your Network Using the Cisco CSR 1000v

Written by Ed Mier, Founder of Miercom
Does it make sense to implement a router in software? And if so, under what conditions? Hardware routers will always outperform software-based routers, by a factor of 20. It’s like pitting a Maserati ...
Read More

How Vulnerable is Your Mobile Device?

Nearly 1 million new devices are being infected daily by Hummer, a mobile trojan juggernaut, that has earned hackers nearly $500,000. Malicious apps, games, and pop-up adverts are installed onto smartphones remotely, posing as apps like Facebook, WhatsApp, and Uber ...
Read More

How Could These Infamous Data Breaches Been Avoided?

Target, Home Depot, Anthem, what do these companies have in common? They have all been hacked on a massive scale – incurring millions of stolen confidential data files, usernames, personal ID numbers and credit cards. With more of these breaches ...
Read More

Lookout and Microsoft Integrate Mobile Security Platforms

Lookout announced yesterday that they will be partnering with Microsoft to integrate Lookout Mobile Threat Protection with the Microsoft Enterprise Mobility Suite (EMS). With the new integration of the two mobile platforms, these two companies aim to give enterprises an ...
Read More

Leave a Reply