Leading Archives

Kayla Matthews

7 Technology Trends to Look for in 2020

Leading Tech Trends 2020 Cloud computing has become the norm. As of 2019, 94% of IT professionals were using the cloud in some form or another ...
Cloud Share

Moving Test and Dev to the Cloud: How the "As-A-Service" Economy Delivers Tangible Benefits

Moving Test and Dev to the Cloud Have you ever seen the old parlor trick in which a person pulls a tablecloth out from under ...
Kayla Matthews

Online Lottery Scams Are Unfortunately Alive and Well

Fake Lottery Scams Are Alive and Well: What to Look For You've just won $50,000! Or, perhaps you qualify to go on a 'round-the-world cruise ...
Erikkangas 205x205

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency ...
Apps Image

Report: Cybercriminals Rely On People To Access Corporate Environments

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a ...
Comic Att

SECURITY RESOURCE HUB

Elevating tech security to new heights!

Cloud security news, resources, thought leadership and infographics covering topics such DDoS, Ransomware, Privacy Breaches, cybersecurity certification and more...

THOUGHT LEADERSHIP

Madhaven Krishnan

Steps To Achieve Hyper Productivity With Your Digital Apps Development

By Madhavan Krishnan | October 21, 2020

Achieve Hyper Productivity The mobile and cloud revolution in enterprise IT is well underway and is already causing never-before–seen changes in the way apps are developed, managed and transformed. The driving factors behind these changes are massively empowered consumers who

Gary Bernstein

5 Notable Proxy Servers Adding That Extra Layer Of Privacy

By Gary Bernstein | October 8, 2020

What’s A Proxy Server? A proxy server is a gateway between the user and the internet. This is an intermediary server that separates end users from the websites they browse. It’s completely legal to use a proxy server. Proxy servers

Alex Brisbourne

Industrial IoT Cyberattacks Continue To Rise

By Alex Brisbourne | October 6, 2020

IoT Industrial Security The Internet of Things (IoT) includes both traditional electronics and everyday ‘things’ embedded with sensors, computing, and networking capabilities. From smart coffee makers and smart homes to smart lighting and smart cities, IoT is all around us.

Texture Cloud

Building a Cloud Roadmap

By Yuri Gubin | September 30, 2020

Cloud Roadmapping Why is it important to have a cloud roadmap? What’s the best way to begin building a cloud roadmap? What points should a cloud roadmap include? Who should be included in the roadmap building process? How often should

Steve Prentice

The Human Element of Zero Trust

By Steve Prentice | September 28, 2020

The Awareness of Malicious and Threat Actors Security specialists have long known that a single weak link in a chain is all that is needed to bring down a cyberdefense. Sometimes this comes down to an errant line of code