Every year, small business networks, security, and cloud infrastructure grow increasingly complex across more devices. [...]
Cyber threats are continually evolving in complexity and volume, but the pandemic presents new opportunities for cyber [...]
Although HIPAA regulations mandate safeguards, companies must determine what is appropriate for their organization. [...]
Recently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting Amazon [...]
Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification [...]
Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, [...]
Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced [...]
Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads.
Sign up here to get the latest updates regarding cybersecurity, cloud computing, artificial intelligence (AI) and machine learning, as well as unified communications.