Blog

Latest Post

Recent

More Posts

Sophos Cloud Optix and Public Cloud Security

Sophos Cloud Optix and Public Cloud Security

Cloud computing, including Software-as-a-Service (Saas) and Platform-as-a-Service (PaaS), has revolutionized the way businesses use technology. For organizations, moving email or application workload to the cloud can allow them to leverage affordable storage or...

AI and The Future of Cybersecurity

AI and The Future of Cybersecurity

Cybersecurity has always been a rapidly evolving field, after all, security needs to try to keep up with hackers, malware, and other threats. Today, the latest evolution in cybersecurity is the use of AI to predict threats. Today, we’re seeing a wave of...

Protecting Against Black Hat Hackers

Protecting Against Black Hat Hackers

While most hacking is illegal, sites like Hacker’s List have gotten a lot of news coverage in recent years. These sites claim that you can hire a hacker anonymously and safely pay them with either your credit card or Bitcoin. While hacker for hire sites may claim...

The Pros and Cons of Generated Passwords

The Pros and Cons of Generated Passwords

There are many websites online today that promise to create randomly generated passwords for you. These password generators, also known as linear congruential generators, use algorithms to create a random string of letters, numbers and special characters. While...

How to Stop Hacks Caused by Intel Chip Flaws

How to Stop Hacks Caused by Intel Chip Flaws

Recently, it’s come out that there is a flaw in Intel chips that has left millions of computers vulnerable. This flaw allows attackers to steal any data that the Intel processor has recently accessed. The attack, dubbed ZombieLoad, was discovered by Graz University of...