Category Archives: Web Services

An Intro to Confidential Computing

Confidential computing is an emerging industry initiative and a form of technology that’s capable of isolating and encrypting data in use — or, data that’s in a processing phase within a central processing unit (CPU).

Continue Reading →

Cybersecurity podcast top picks

Stay up to date on the latest cybersecurity news and trends with this list of top podcasts. 

Continue Reading →

NSA report provides latest recommendations for data security

When it comes to cybersecurity, nobody does it as well as the NSA. A report released by the U.S. intelligence agency offers plenty of advice for you to keep your network secure. 

Continue Reading →

Hackers are exploiting a critical vulnerability in the Log4j Java library

A critical vulnerability in Apache’s Log4j Java library leaves companies scrambling to defend against hackers.

Continue Reading →

GoDaddy security breach leaves WordPress users’ data exposed

Here’s a look at the recent GoDaddy security breach, which left WordPress users’ data exposed.

Continue Reading →

Impacts of COVID-19 stretch to cybersecurity

With everything happening in the world, a new look at cybersecurity and online protection is not only important, but necessary for the wellbeing and security of people around the globe.

Continue Reading →

Major United Nations data breach leaves the international organization scrambling

The United Nations is still reeling from a data breach carried out at the beginning of the year using compromised employee login credentials, potentially purchased from the dark web for as little as $1,000.

Continue Reading →

T-Mobile data breach leaves millions with compromised personal information

When large, consumer facing companies are hacked, the impact can be enormous. Just ask T-Mobile, who are now on their fifth data breach in four years.

Continue Reading →

IBM Report suggests record data breach costs

You already knew that data breaches can be costly. A new report from IBM and the Ponemon Institute suggests that’s truer now than ever before.

Continue Reading →

Java and other legacy vulnerabilities at heart of recent threat and breaches

IT administrators must always be vigilant in the face of new cyberthreats — especially if they rely on legacy applications or hardware.

Continue Reading →