Is your most terrifying dark secret that you’ve used the same password on every website you’ve visited for the past 10 years? Are you worried about the security of your financial, e-mail and social media accounts?Read Article
I’ve heard it a hundred times: Should I store my files in my Dropbox account or in my Cloud account? Isn’t The Cloud better since it is more modern than Dropbox? I begin to tremble with fury …Read Article
This feature first appeared in the Summer 2014 issue of Certification Magazine.
Criminals lurk in many of the Internet’s dark corners, scouting out victims and eager to pounce whenever they identify a network vulnerability. Organizations that fail to apply basic security controls to their networks face a multitude of risks from anonymous attackers, including theft of …Read Article
Sometimes finding out about a cybersecurity vulnerability is like seeing a mouse in the kitchen. Before it happens, both businesses and home computer users tend to assume that their IT security is entirely shipshape. If you haven’t seen any problems, then why would you assume that problems exist, right? You only start asking questions after you …Read Article
In an article penned for Certification Magazine last month, I spent some time speculating about the next version of Microsoft Windows, the beta release of which was due out Sept. 30. In that article, I pieced together all of the rumors and speculation to try to form a coherent picture of what this …Read Article
The term Internet of Things, or IoT, was coined in 1999 by Kevin Ashton. Ashton, a British technologist who co-founded the RFID-pioneering (radio frequency identification) …Read Article