The Computer Fraud and Abuse Act (CFAA) is an important cybersecurity law. Discover more about the l
By Aimee O'Driscoll
in Information Security
on October 5, 2018
Remote working is becoming prominent, particularly among tech businesses and the private sector. We cover the rules and tools to implement this strategy.
By Stephen Cooper
in Net Admin
on November 15, 2024
Social media is a haven for a specific type of hacker, a relatively new breed in the online realm ca
By Paul Bischoff
in Information Security
on August 26, 2017
Datadog is a rapidly expanding cloud platform of IT system monitoring and management tools. We review the company behind the service.
By Stephen Cooper
in Net Admin
on September 26, 2024
Logpoint is a SaaS platform of cybersecurity tools, but what about the company that provides it? We detail the background of Logpoint.
By Stephen Cooper
in Net Admin
on September 26, 2024
2.1 million customer records breached at Mexican online bookstore, personal and purchase data stolen
Mexico-based bookseller Librería Porrúa exposed millions of customer records to anyone with an internet connection. The database was subsequently wiped out and held for ransom by hackers.
By Paul Bischoff
in VPN & Privacy
on August 1, 2019
Hackers find security weaknesses in computer software and operating systems. Use a vulnerability manager to spot those weaknesses first and shut them down.
By Stephen Cooper
in Net Admin
on October 4, 2024
You probably realize that making backups helps protect your data from a range of disasters, including ransomware, but what do you do if your backup gets infected as well?
By Stephen Cooper
in Net Admin
on February 8, 2024
Cybercriminals are buying and selling access to hacked RDP servers to conduct fraud and launch cyberattacks, Comparitech researchers found.
By Paul Bischoff
in Information Security
on March 15, 2022
Becoming a Certified Ethical Hacker (CEH) can be a smart career move and can be incredibly lucrative. Find out how to learn ethical hacking and the best online courses available.
By Penny Hoelscher
in Information Security
on January 8, 2024