In recent decades, the healthcare sector has undergone a profound digital transformation, enhancing efficiency in patient care and information management. However, this shift has also made healthcare organizations more vulnerable to cyberattacks. The systems handle highly sensitive information—personal data, medical records, test results—which can be misused for purposes far beyond healthcare or...
Cyberattacks in August: Heightened risks during vacation season
Who has been targeted by a cyberattack this August? For millions around the world, August is synonymous with vacations. As beaches fill up and offices empty, another group is gearing up to exploit the season: cybercriminals. This month, more than any other, offers a prime opportunity for cyberattacks, as digital vigilance and security tend to wane during the holiday period. The Surge in...
5G FWA vs fiber – Which is best?
Although superfast broadband - with a download speed of at least 30Mbps - is by now widely available, the demand for services that use ever-higher volumes of data with equal availability and reliable connectivity is steadily increasing. This has been highlighted by the COVID pandemic and the shift towards working from home. In response, governments around the world have been establishing...
High-speed Internet from space: The Starlink network
Accessing the Internet from space is not new, with many companies (OneWeb, Space Norway, Telesat, etc.) now offering it. More recently, however, a new participant has emerged on the scene promising something different – Starlink. SpaceX’s plan is to create a network of 12,000 satellites that fly from 350 to 1160 km above our heads and provide fast Internet access using lasers. Each satellite...
DTLS security over UDP
DTLS (Datagram transport Layer Security) is a protocol that provides privacy for UDP communications. To understand DTLS, you first need to understand UDP. UDP (User Datagram Protocol) is a transport layer protocol based on the exchange of datagrams (encapsulated in OSI model Layer 4 or transport layer). It allows datagrams to be sent over the network without first establishing a connection to...
And we come to SD-WAN
When I first laid my hands on a computer in the early Eighties, I didn’t realize at the time the full magnitude of what I was looking at. From then on, the interest in technology was never to end. Soon, personal computers (PC), with their colorful screens and countless possibilities, would start to be popularized among residential users and businesses starting to put their new equipment to work...
Categories/Tags