Blog
Investing in Cybersecurity Defenses
How can you justify a cybersecurity budget? How do you know where to best invest your money so that you get the most bang for...
How Malware Works
Malware: software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Types of Malware (click on each for Wikipedia/Webopedia definition)
-
...
What You Should Know About Beacons
Beacons are small, wireless transmitters that use low-energy Bluetooth technology to send signals to other smart devices nearby. WordStream.com Offices and personal spaces are becoming more...
Security is Cumulative
Security is cumulative. The threat landscape is always changing. As technology evolves there are new attacks in which we must defend against. But that does...
Gaggle Safety Management
Gaggle helps ensure the safety of students by combining machine learning technology with real people who review questionable or suspicious content in email,...
NetworkScout
We have partnered with Secure Ideas who will offer a consortium discount on NetworkScout to our members.
Secure Ideas’ NetworkScout...