Blogs

Security myths
According to the National Cyber Security Center, the cyber arm of Great Britain’s GCHQ, these are the two most common myths concerning network security.
Bleichenbacher attack
A new cryptographic attack allows attackers to intercept data believed to be secure through TLS. The researchers who identified it have dubbed it ROBOT, an acronym for Return of Bleichenbacher’s Oracle Threat.
State of the Union address
Technology was a focal point for one brief, shining moment during last night’s State of the Union address.
exploration
Apparently, the road to digital transformation is paved with fewer Fortune 1,000 logos than you’d think.
Insurance policy lapse
Many analysts believe the current cyber insurance market will double in the next 18 months, from $4 billion to $8 billion in premiums.
IoT Trends
Here a few of the ways IoT will become more ubiquitous in our day-to-day lives in 2019.
Exciting technology
Like a kid on Christmas morning, many organizations are so excited about implementing the latest and greatest technology that they're getting ahead of themselves.
Fiber optics
While not a household name, Richard Sturzebecher should be.
Wi-Fi Technology
It’s about time Wi-Fi technology pulls its own weight. Isn’t it about time we ask Wi-Fi what else—other than connecting us to the world—it can do for us?