Latest Post


More Posts

Security at the Edge

Rather than relying on the cloud or data centers, computing is now done at or near the source of the data, otherwise known as the edge. While the cloud is being leveraged for storage and computing power, things have become centralized. But distance can mean latency. Edge computing provides an answer.

The Need for Phishing Training

This is becoming one of my favorite phishing scams. Not just because it’s hilariously worded, but because the sender isn’t even putting in the effort to create malware, create a malicious site, or gain control over your account in any way.