Category: Web Services

An Intro to Confidential Computing

Confidential computing is an emerging industry initiative and a form of technology that’s capable of isolating and encrypting data in use — or, data that’s in a processing phase within a central processing unit (CPU).

Continue Reading
Cybersecurity podcast top picks

Cybersecurity podcast top picks

Stay up to date on the latest cybersecurity news and trends with this list of top podcasts. 

Continue Reading

NSA report provides latest recommendations for data security

When it comes to cybersecurity, nobody does it as well as the NSA. A report released by the U.S. intelligence agency offers plenty of advice for you to keep your network secure. 

Continue Reading

Hackers are exploiting a critical vulnerability in the Log4j Java library

A critical vulnerability in Apache’s Log4j Java library leaves companies scrambling to defend against hackers.

Continue Reading
GoDaddy security breach leaves WordPress users' data exposed

GoDaddy security breach leaves WordPress users’ data exposed

Here’s a look at the recent GoDaddy security breach, which left WordPress users’ data exposed.

Continue Reading

Impacts of COVID-19 stretch to cybersecurity

With everything happening in the world, a new look at cybersecurity and online protection is not only important, but necessary for the wellbeing and security of people around the globe.

Continue Reading

Major United Nations data breach leaves the international organization scrambling

The United Nations is still reeling from a data breach carried out at the beginning of the year using compromised employee login credentials, potentially purchased from the dark web for as little as $1,000.

Continue Reading

T-Mobile data breach leaves millions with compromised personal information

When large, consumer facing companies are hacked, the impact can be enormous. Just ask T-Mobile, who are now on their fifth data breach in four years.

Continue Reading

IBM Report suggests record data breach costs

You already knew that data breaches can be costly. A new report from IBM and the Ponemon Institute suggests that’s truer now than ever before.

Continue Reading

Java and other legacy vulnerabilities at heart of recent threat and breaches

IT administrators must always be vigilant in the face of new cyberthreats — especially if they rely on legacy applications or hardware.

Continue Reading