Blog
Discover what’s new
Our latest thought pieces
Everything You Need to Know About Van Eck Phreaking
It’s untraceable and requires access to neither your computer nor your network. And it can give a hacker a picture of what you’re doing on your PC. It’s called Van Eck Phreaking, and it sounds terrifying. But is it really a threat?
What The Recent Twitter Hack Can Teach Us About Cybersecurity
On July 15, hackers executed a massive attack on Twitter, compromising some of the highest-profile accounts on the social network. Here’s what businesses should learn from it.
Why Addressing the Wage Gap Is the First Step to Solving the Cybersecurity Skills Shortage
The tech industry still faces a considerable talent shortage, particularly in the cybersecurity space. The first step in eliminating this shortage is to address the fact that, even today, women are paid less than men. Here’s why.
3 Lessons Healthcare Providers Need to Learn About Cybersecurity
No industry or sector is immune to cybersecurity threats, but healthcare is targeted with particularly high frequency. Healthcare providers need to be cognizant of that, and must also understand the importance of safeguarding critical data.
Why it’s Critical To Equip Your Employees With A Password Manager
Passwords are something we deal with every single day. Most passwords, however, are horrendously insecure. That’s where password managers come in – if you aren’t willing to phase out password-based authentication entirely, it’s imperative that you equip your staff with one.
The Importance of Cybersecurity by Design in a Modern Threat Landscape
Cybersecurity used to be a lot simpler. Control access to critical assets, ensure you have proper threat detection software in place, and monitor your network for suspicious activity. Times have changed – today’s digital landscape requires a more proactive approach.
Talking to the C-Suite – How You Can Get Leadership On-Board With Organizational Cybersecurity
Although the C-suite is becoming increasingly better-educated about the critical role security teams play in the corporate world, cybersecurity can be frustrating to laypersons. As a CISO, effectively communicating security knowledge is both your greatest challenge and your most important task. Here are a few ways to get that conversation started.
Securing IoT Devices in Your Data Center
Through the Internet of Things, we stand at the edge of a world in which both our personal and professional lives will be redefined by Internet-connected devices. This evolution is already disrupting multiple industries, including the data center. Yet it’s not without its risks, security chief among them.
Exploring the Inextricable Link Between Cloud Computing and the Internet of Things
The cloud and the Internet of Things have a lot in common. More than you might expect, actually. You cannot have one without the other. The decentralized, distributed nature of the cloud makes it a necessary foundation for IoT. This isn’t the only way the two are inextricably linked, however.
Recent Posts
- Backup-as-a-Service vs. Disaster-Recovery-as-a-Service: A brief comparison
- Scalability and flexibility: A guide to hybrid cloud solutions
- The evolving landscape of disaster recovery: When and how to refresh your strategy in 2024
- Prepare for the Worst: The Most Common IT Disasters
- 6 Most Common DaaS Mistakes to Avoid