Confronting Mobile Device Security Issues

Over ten years ago Apple changed the world forever with their introduction of the smartphone. In that time, smartphones have started replacing desktop and laptop computers, making mobile device security essential to address for enterprises. According to a 2018...

Domination of Cloud-based Services

A few years ago, techie individuals had the only interest in cloud computing and cloud-based services. However, it had little use for business at large. That has all changed, and rapidly. No longer are enterprises in a cloud first mentality. Rather, business is...

Multi-threading Security Threat: PortSmash

There has been an ever-increasing need for CPUs, both commercial and consumer, to perform faster. In order to do so, certain aspects have been built into processors. While increasing performance, multithreading and speculative execution have left CPUs and networks...

Cyber Threats: Business Still Has Biggest Risk

The United States government is in the news for the third time in two weeks regarding their cybersecurity. Not only did the government fail when the weapons program was tested, but now there have been two confirmed data breaches in two weeks. Of course, when the...