Making Multi-Factor Authentication Work for You December 17, 2021 Hugh Taylor Off Articles and Opinion, Guest Posts, Guest Post by Paddy Srinivasan, Chief Product & Technology Officer, LogMeIn Given the rise of...
Three Steps You Can Take to Give Your Security Culture Superpowers Inspired by the Marvel Universe December 10, 2021 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, GUEST POST by Amanda Fennell The echoes of 2020 have reverberated into 2021 with another...
What’s Next for Insurance in Crypto Investing September 10, 2021 Hugh Taylor Off Articles and Opinion, Guest Posts, by Sam Ingalls Since the days of Hammurabi – nearly four thousand years ago –...
US Government’s Ransomware Moves Likely to Affect Corporate Compliance June 14, 2021 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, By Elisabeth Buscemi In response to the surge in ransomware attacks targeting operational processes...
Romance Scams Are On The Rise and Victims Need Support March 9, 2021 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, From NordVPN: Cyberbullying and Romance Scams were the most visited pages on Cybercrime Support Network’s...
Top 10 Ultimate gaming phones February 1, 2021 Hugh Taylor Off Guest Posts, Mobile gaming has become popular throughout the years. Compared to computers and beefed-up gaming consoles, mobile...
Consumer Privacy Tips from Invisibly January 18, 2021 Hugh Taylor Off Articles and Opinion, Guest Posts, From Don Vaughn, Invisibly’s Head of Product, suggestions for consumers who want to keep their...
What are the Benefits of IT Security Services? December 22, 2020 Hugh Taylor Off Articles and Opinion, Guest Posts, IT security services are also known as #managed security services. Now you can hire an...
How to Protect Your APIs from Bot Attacks December 17, 2020 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, By Brad LaPorte, Chief Evangelist, Kasada The pandemic has forever changed how we work, shop,...
33 Types of DDoS Attacks Dissected October 2, 2020 Hugh Taylor Off Articles and Opinion, Featured, Guest Posts, By David Balaban Every electronic system has a finite data processing capacity. This threshold is...