Why Your Website Needs a “Discovered Content” Section
One of the advantages of social content sharing is that if I like what you write then there’s a good chance I’ll like what you…
One of the advantages of social content sharing is that if I like what you write then there’s a good chance I’ll like what you…
In today’s digital age, personal and professional data are constantly being stored, transferred, and backed up across various devices. Among these devices, hard drives and…
Data breaches are rising across industries, hitting healthcare, finance, and retail especially hard. The damage goes beyond lost data, as it’s financial, operational, and reputational.…
One thing that bothers me severely is the concept of a conditional friendship. There are a few ways these come about, but the most common…
Non-compliance can cost organizations 2.71 times more than maintaining compliance programs, according to Secureframe. That’s because non-compliance can result in business disruption, productivity losses, fines,…
Sometime within the last couple months I’ve realized that CNN and Fox (and most cable news channels) have become news entertainment. The reason for this…
I like pens. I’m a Moleskine fan (yeah, one of those guys), and I like having writing utensils that match the class of that surface.…
US-headquartered cybersecurity company WatchGuard Technologies has released the findings of its latest Internet Security Report. The analysis details the top malware, network, and endpoint security…
Few things get me as excited as data visualization. I seriously love the stuff, and this project by the New York Times is excellent. It…
Cloud security company Zscaler has released its ThreatLabz 2025 VPN Risk Report, commissioned by Cybersecurity Insiders. The report highlights the widespread security, user experience and…
Here’s how to redirect from one domain to another within Apache using .htacess. This is how to do it permanently (using an HTTP 301 redirect)…
An investigation by Fortinet has uncovered a post-exploitation technique used by a threat actor. During this investigation, a threat actor was observed using known vulnerabilities…