Cloud computing has had a tumultuous but largely successful journey into the mainstream since its inception. For the average online citizen, the cloud now provides hundreds of gigabytes of free or relatively inexpensive online storage.Read Article
Is your most terrifying dark secret that you’ve used the same password on every website you’ve visited for the past 10 years? Are you worried about the security of your financial, e-mail and social media accounts?Read Article
I’ve heard it a hundred times: Should I store my files in my Dropbox account or in my Cloud account? Isn’t The Cloud better since it is more modern than Dropbox? I begin to tremble with fury …Read Article
This feature first appeared in the Summer 2014 issue of Certification Magazine.
Criminals lurk in many of the Internet’s dark corners, scouting out victims and eager to pounce whenever they identify a network vulnerability. Organizations that fail to apply basic security controls to their networks face a multitude of risks from anonymous attackers, including theft of …Read Article
Sometimes finding out about a cybersecurity vulnerability is like seeing a mouse in the kitchen. Before it happens, both businesses and home computer users tend to assume that their IT security is entirely shipshape. If you haven’t seen any problems, then why would you assume that problems exist, right? You only start asking questions after you …Read Article
In an article penned for Certification Magazine last month, I spent some time speculating about the next version of Microsoft Windows, the beta release of which was due out Sept. 30. In that article, I pieced together all of the rumors and speculation to try to form a coherent picture of what this …Read Article