Cloud security: Inside the shared responsibility model

In the latest major cloud security foul-up, Capital One suffered a data breach, which affected 100 million people in...

What is phishing? Learn how this attack works

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Stay tuned for what you need to know about this increasingly sophisticated form of cyberattack.The...

What is the dark web? And what will you find there?

The dark web may sound ominous, but it’s really a catch-all term for the part of the internet that isn't indexed by search engines. Stay tuned for a guided tour...

What the FTC’s $5 billion fine really means for Facebook | TECH(feed)

Hey everyone welcome back to tech feed, i’m juliet beauchamp. Yes, we are back after a bit of a break--hope you didn’t miss me too much. Today let’s talk about...

How the Huawei ban could become a security threat | TECH(feed)

Hey everyone welcome back to tech feed i’m juliet beauchamp. Today, i’ve got more on huawei--i’ve already discussed how the proposed huawei ban could be bad for business. This time...

6 keys to MongoDB database security

Security is a trending topic again, thanks to recent data leaks involving big corporations. For example, as , Chinese companies have leaked an astonishing 590 million resumes. Most of the...

You Can Now Get This Award-Winning VPN For Just $1/month

If you use the internet (which you clearly do), you likely know how important it is to protect your data in an increasingly dangerous cyber environment. But like other essential...

How to eliminate the security risk of redundant data

When you move, you have a few choices of what to do with all the stuff you’ve accumulated. You could sell or donate most of the stuff you’ve accumulated over...

2 security tricks your cloud provider won’t tell you

Cloudops (cloud operations) and secops (security operations) are quickly evolving practices. While I’m seeing some errors, what’s more common is that ops teams are leaving important things out. If these...

How to address IoT’s two biggest challenges: data and security

You don’t even need to Google “data growth and IoT” to see the trend for the internet of things; all research shows a steep curve up and to the right....

STAY CONNECTED

2,973,060FollowersFollow
13,460,346FollowersFollow
6,580SubscribersSubscribe