One of the smartest moves we can make to protect ourselves online is to use a password manager. It’s one of the easiest too. We’ll help you find the best password manager for you. A password manager is an excellent first step in securing your online identity, helping you increase the strength of the passwords…

Billions of dollars are spent every year on cyber security products; and yet those products continually fail to protect businesses. Thousands of reports analyze breaches and provide reams of data on what happened; but still the picture worsens. A new study takes a different approach; instead of trying to prevent hacking based on what hacking…

Researchers at Ben-Gurion University of the Negev in Israel have disclosed yet another method that can be used to exfiltrate data from air-gapped computers, and this time it involves the activity LED of hard disk drives (HDDs). Many desktop and laptop computers have an HDD activity indicator, which blinks when data is being read from…

 Cisco Introduces New Data and Analytics Training Portfolio and Major Updates to the Data Center Certification Track

SAN JOSE, Calif., Jan. 17, 2017 – To support the skills needed for world-class digital business transformation, Cisco today announced a new data and analytics training portfolio and significant updates to its data center certification track. The new data and analytics offerings focus on integrated data management and virtualization, teaching in-demand skills needed to connect…

How valuable is personal healthcare data? Apparently it depends. Based on at least some price comparisons on the Dark Web – the underground online marketplace for cyber criminals – electronic health records (EHR) are not even close to premium goods. McAfee, now a division of Intel Security, reported recently that the price for an individual medical…

While safeguarding personal and business data has always been important, the necessity for maintaining digital privacy has become even more vital as more of our records are digitized. People are starting to realize that passwords alone aren’t enough. Even with password protection, anything on your computer can potentially be viewed by an enterprising hacker. And…