Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology.
He has worked for some of the largest tech companies (Deluxe Digital, Sony, Autodesk) and is passionate about online privacy and digital freedom.
There's a lot you can do with pfSense. It's a very powerful firewall/router. In this post, we look at how to set up your own OpenVPN server in pfSense.
Command and control attacks can be devastating to your organization. This post takes an in-depth look at command and control attacks and provides tips on how to defend against them.
As Iot devices grow in popularity, the number of threats that come with these devices is growing along with it. This post looks at the top 5 threats from IoT devices and what you can do to avoid them.
There are plenty of viruses that target devices, but macro viruses target applications - typically Word and Excel. In this post we look at how macro viruses work and what you can do to avoid them.
Pass the hash attacks can be very difficult to detect because attackers use "legitimate" credentials to pull them off. This post looks at how these attacks work and what you can do to defend against them.
If your infrastructure is vulnerable to server-side request forgery attacks, the consequences could be devastating to your organization. We explain how SSRF attacks work and how you can avoid them.
You may not have heard of typosquatting before but it can have some pretty serious consequences. This post looks at how typosquatting works and what you can do to defend against it.
Form action Hijacking attacks can compromise your personal information online. In this post, we look at how that attack works and what you can do to prevent them.