Cryptocurrency may be in its infancy, but like the Internet, its adoption has been far reaching and its implications are enormous, says Naresh Pema, Enterprise Engineer Open Source.
Proper planning key to pre-empting invisible cyber attacks
Specialists say behavioural monitoring and control of the core network component are important for protecting companies against "invisible" cyber attacks.