This feature first appeared in the Summer 2014 issue of Certification Magazine.
Criminals lurk in many of the Internet’s dark corners, scouting out victims and eager to pounce whenever they identify a network vulnerability. Organizations that fail to apply basic security controls to their networks face a multitude of risks from anonymous attackers, including theft of …Read Article
Sometimes finding out about a cybersecurity vulnerability is like seeing a mouse in the kitchen. Before it happens, both businesses and home computer users tend to assume that their IT security is entirely shipshape. If you haven’t seen any problems, then why would you assume that problems exist, right? You only start asking questions after you …Read Article