Blog

I’m not tired of WiFi! Are you?

I’m not tired of WiFi! Are you?

Are you tired of watching funny cat or dog videos yet? How about your favorite TV show or a movie on your smart TV or personal devices? Or playing Fortnite? Or being able to grab your laptop and take it with you to the meeting to project those slides you (just) finished (whew!)? Or asking your talking home “assistant” for a weather report or recipe?  Or having a WebEx meeting with remote colleagues using video technology?  How about checking your email while you are waiting on a flight? Or viewing your home security cameras? Or re-setting your thermostat remotely?

Not only are you not tired of it, but you are doing more of it.

Why should I use private browsing?

Why should I use private browsing?

You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network where the exchange of information is often difficult to track. Here are some good reasons to “go incognito”. With the headlines about data breaches and cyberattacks greeting […]

Three Cyber Threat Hunting Myths

Three Cyber Threat Hunting Myths

In my last cyber threat hunting blog, I defined cyber threat hunting and outlined when and why you should use it. Just to reiterate, cyber threat hunting is the process of proactively and iteratively searching through your network to detect and isolate advanced threats that evade existing security solutions.

The most pressing data concern in 2019

The most pressing data concern in 2019

Around this time every year, I always see an influx of the top trends in technology. It seems like the perennial hot topic is security, with good reason as each year the number of incidents and evolving creativity with which these attacks are orchestrated contribute to an increase in the sheer magnitude of losses.

Are EHRs useful?

Are EHRs useful?

The healthcare industry is embracing the use of electronic health records (EHRs). It advances a new type of data management system that aims to improve on traditional paper-based ways. But will it? What is an electronic health record? An electronic health record (EHR) is an individual’s official health document accessible via mobile devices such as […]

Going nowhere fast?

Going nowhere fast?

Studies show that even under perfect driving conditions, speeding over short distances leads to marginal savings in getting to your destination. Add a few traffic lights, a couple of curves, a bit of traffic or weather, and the time-saving benefits taper down to little or none.

Five common misconceptions about DDoS

Five common misconceptions about DDoS

In my first blog on distributed denial-of-service (DDoS) detection, “DDoS: It’s Not a Matter of If, But When,” I provide a brief understanding why someone might initiate a DDoS attack and outlined the three variations of attacks.

In part two of this series, I refute five commonly held misconceptions about DDoS. I don’t mean to scare you, but DDoS attacks have been documented to cause “beaucoup” damage to organizations around the globe.