Our Latest Blog Posts.

Cylus- Cyber Security Solutions for the Railway Industry

As railways progress to automated and wireless technologies, their most safety-critical assets are exposed to new and dangerous types of cyber threats. Cylus is a cybersecurity startup dedicated to addressing the security challenges of the railway industry, led by senior officers from the IDF’s

Read Post >>

Cyber-Secure your Connected Car With GuardKnox

GuardKnox, an automotive cyber security provider, protects the users of connected vehicles against threats that can endanger their physical safety, as well as the safety of their personal information. We had the honor and pleasure to speak with CEO Moshe Shlisel about some of the most burning

Read Post >>

CompTIA Security+ Guide to Network Security Fundamentals- Free Chapter Included!

Dr. Mark Ciampa is an Associate Professor of Information Systems in the Gordon Ford College of Business at Western Kentucky University.  Prior to this he was an Associate Professor and served as the Director of Academic Computing at Volunteer State Community College in Gallatin, Tennessee for 20

Read Post >>

How to Clean up Your Computer in 7 Easy Steps

Cleaning up a computer can be a tedious exercise, but the end result is always worth it. Keep your machine in prime condition, inside and out, with these fast and simple tips!

Read Post >>

CEO Perspective: Peer Heinlein Talks About Email Privacy

Peer Heinlein is the founder of mailbox.org, a German e-mail privacy service that offers protected and spam-free e-mail accounts starting from as little as €1. In this interview, Peer talks about e-mail encryption, and explains why he believes it to be the future of email

Read Post >>

Are Blockchain and Bitcoin Really Immutable?

We take a deep look at the concept of blockchain, how it applies to Bitcoin, and if they are immutable or not.

Read Post >>

What's a Credit Freeze and What's the Best Way to Do It

Data breaches can lead to identity theft, putting your finances at risk. Freezing your credit is a simple way you can protect yourself. Here's how you do it.

Read Post >>

Become The Ultimate Hacker - Free Chapter by MJG Publishing

"The purpose of Become The Ultimate Hacker – Computer Virus, Cracking, Malware, IT Security and the other books around the series 'Programming for Beginners' is to help readers acquire new knowledge through the books we offer", says publisher Marco Grishaber. "Our intention is to help enhance the

Read Post >>

AV-Test VPN Report – Summary of Findings

In June 2018 the independent security institute, AV-Test, released an evaluation of twelve VPNs. The following VPNs were studied: Hotspot Shield Elite, Avast SecureLine, Avira Phantom VPN Pro, Cisco VPN, ExpressVPN, F-Secure FREEDOME VPN, VPN Unlimited, Private Internet Access, NordVPN, Pulse

Read Post >>

Automate your Blue and Red Teams with XM Cyber's APT Simulation Platform

XM Cyber was founded by the highest caliber of security executives from the elite Israel intelligence sector. Together they bring a proven track record in offensive and defensive cyberspace. In this interview CEO Noam Erez overviews some of the problems that corporations are facing with cyber

Read Post >>

Meet Atera - The Wix of Remote IT Management Platforms

Atera is an easy to use, all-in-one IT management platform, aimed at helping managed service providers (MSPs) build better businesses by giving them advanced tools and data to work with. As a result, Atera is striving to improve the quality of IT for small-and medium-sized businesses (SMB's)

Read Post >>

Take IT to the Next Level with Astaris Remote IT Department

Astaris is an IT support business founded by a husband and wife team who actually love working together. Their diverse skills include engineering, marketing and management, which helps them run entire IT departments remotely for small and medium size businesses all across the UK. In this blog post,

Read Post >>

5 Lessons that John Barlow Taught the World

Grateful Dead lyricist and digital rights activist, John Perry Barlow passed away. Here are five lessons we can learn from him.

Read Post >>

How to Create a Strong Password - 7 Golden Rules

- Having different passwords for different services is a must - Updating passwords frequently is a must - Using a (silly) phrase is a suggested as a way to create passwords. -

Read Post >>

Secure Your Hybrid Cloud Configurations with Alcide

The benefits of the hybrid cloud and DevOps are both well known. But what happens when these two models intersect? Often DevOps and Security teams struggle to account for the added complexity introduced by hybrid configurations. Luckily for them, Alcide has the answers, as CEO Ranny Nachmias

Read Post >>

Report: Critical Flaws in Cybersecurity Devices Exposed Entire Networks to Attack and Takeover

Three vulnerabilities in cybersecurity provider Cyberoam’s firewall technology, discovered by different ethical hackers working independently, exposed potentially millions of internet devices and their users to high-level attacks and

Read Post >>

Interview with Author of Recent Advances in Cybersecurity - Free Chapter Included

In Recent Advances in Cybersecurity, author Elsadig Saied aims to introduce the reader to cybersecurity and critical information infrastructure protection mechanisms. It includes the historical aspects of ICT development, and a broad classification of cybersecurity problems. In this interview,

Read Post >>

Malware Threats by Saiful Hassan - Free Chapter Included

Malware Threats is a new book by Saiful Hassan that explains various malware threats and how to protect yourself. We sat with him to talk about his book and he gave a sneak preview to the first

Read Post >>

Privacy in Technology - Standards and Practices for Engineers, Security and IT Professionals

JC Cannon is considered as one of the foremost privacy authorities in the US. His background includes over 30 years of developing policies and standards, auditing digital products and services, planning and implementing website strategies and developing software. Most of all, he is known for his

Read Post >>
1...89 90 9192 93