Analyst Blogs

6 Blockchain Questions Your Boss Needs Answered Now

Oct. 19, 2017, 10:48 a.m.

  Question 1: What is blockchain? At its core, blockchain is a public ledger technology that uses distributed consensus mechanisms and cryptography (digital signatures and cryptographic hashing) to provide an authoritative and unalterable record of secure transactions. Question 2: Blockchain and bitcoin are the same, right? Not quite. All bitcoin ...


Read more...

Forget Autonomous Cars - Mining Rocks and Telcos Should Care

July 20, 2017, 9:43 a.m.
Lian Jye Su, Senior Analyst

"We were doing V2V ten years ago, before V2V became cool!" This is what a CEO of a Wi-Fi mesh vendor told us, whose client portfolio includes 120 mines across the world. That's right, V2V, or vehicle-to-vehicle communications, one of the hottest use cases in 5G, has existed in ...


Read more...

Petya Learns its WannaCry Lesson

June 27, 2017, 3:49 p.m.
Michela Menting, Research Director

The rapid spread of the Petya ransomware is unfortunate yet unsurprising. The WannaCry attack should have been a wake-up call for organizations worldwide of the ease with which malicious actors are profiting from increased connectivity and shoddy cybersecurity. Instead, it provided a valuable case study to cybercriminals about the widespread ...


Read more...

Getting Ahead of Phishing

April 18, 2017, 9:06 a.m.
Michela Menting, Research Director

Phishing attacks continue to be one of the most popular methods of illegitimately obtaining funds, identities, and credentials.  Social engineering, at its best, can entice users to pay over large sums of money, and provide access to private and confidential data that is normally locked down.   The activity has evolved ...


Read more...

Night of the Living Zombie Botnets

March 28, 2017, 6:20 a.m.
Dimitrios Pavlakis, Industry Analyst

Zombie computers, botnets, DDOS, DNS attacks, ransomware - all can be fueled by hordes of insecure devices and malware-infested systems. Devices that have been infected with a specific type of malware which allows stealing of personal data, controlling critical functions, has keylogger and remote access capabilities is usually refer to as ...


Read more...