If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.
GitHub is being acquired by Microsoft. Is it time for developers to panic and export their repositories to another product or can Microsoft be trusted?
So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...
To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users...
Healthcare companies in the US have had to protect sensitive personal data for a long time under HIPAA. But are healthcare companies on the hook in light of the GDPR?
The FCC’s repeal of net neutrality takes effect today (Monday, April 23rd) and it means a lot to all of us.
Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information.
Shadow IT is a real problem -- here are the reasons, as well as a few solutions.
With the ability to quickly analyze massive amounts of data, businesses can increase customer interactions and drive workflow-process efficiencies.