Subscribe to get all the news, info and tutorials you need to build better business apps and sites
We'll update you weekly with all the latest news and tips you need to develop and deploy today's business apps.
The Windows registry can be a goldmine for attackers and clueless employees. There’s no place better suited for introducing security vulnerabilities or completely screwing up a Windows system than the registry.
Retaining openness and transparency while reducing cyber risk is the Holy Grail of educational IT and challenging to implement.
The Gramm-Leach-Bliley Act (GLBA) has been around since 1999, but it doesn't just affect financial services, it also requires higher education to comply.
The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers.
Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.
In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.
Call it Identity Management (IDM), Identity Access Management (IdAM), or even IAM; IT is responsible for its implementation and ongoing maintenance.
In this article, we discuss what the HIPAA Omnibus Rule is and how it relates to HIPAA and HITECH.
At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another.
This article provides the detailed features comparison needed when the need for file transfer moves from occasional to operational.