How to Secure the Internet of Things (IoT)

Published On: Feb 15, 2017 7:30:00 AM

Tips to Secure IoT Data

The Internet of Things is everywhere, whether the general public realizes it or not.

It’s embedded in home appliances, in the packaging of shipments that arrive at their door, and throughout[...]

The User’s Guide to Darkode: A Complete History and How to Use It

Published On: Aug 1, 2016 8:05:00 AM

 The dark web is the wild west of the internet. 

There are no governments or laws limiting what can and cannot be sold. 

There are only codes of conduct amongst the organized crime lords and the subservient dwellers[...]

True Crime: Examining the Frightful Future of Mobile Payment Security

Published On: Feb 1, 2016 10:00:00 AM

Mobile Payments Soar in 2016

eMarketer is forecasting that “The total value of ‘proximity’ mobile payment transactions in the US will grow 210% in 2016.”

The expectation is that nearly one in five smartphone users are[...]

How to Prevent the Internet of Things from Blindsiding Your Business

Published On: Jan 15, 2016 3:19:00 PM

How to prepare for the rise of IoT

Remember way back when, when the idea of smartphones and tablets being in workplace settings seemed as far-fetched as a watch that could function like your cell phone?

(Unless, of[...]

Top 4 Consumer Website Concerns Heading into the Holidays

Published On: Nov 19, 2015 3:16:00 PM

As we roll into the holidays, many organizations are bracing for their busiest time of the year. If you are one of these businesses, you know that this season can make or break your entire year. You want to do[...]

How to Defend Against Threats, Whether They Come from Inside or Outside

Published On: Oct 6, 2015 9:31:00 AM

Despite the big headlines that declare otherwise, no one wants to think that a security breach will happen to their company. For IT directors and their teams, addressing security risks and threats is tough enough[...]

With The Internet Of Things, Can You Ever Be Safe?

Published On: Apr 2, 2015 9:39:00 AM

The Internet of Things and Security

Oftentimes, with the good comes some bad. A snowstorm means great skiing, but also dangerous driving. A free dessert tastes great, but not if it means you now owe the chef a favor.[...]

Tackling Security in the Complex World of BYOD

Published On: Dec 5, 2014 2:03:00 PM

There was a time not that long ago when managing data security at the office involved a simple, clear combination of technology, policy, and enforcement. Now that it is just as easy to access company networks and data [...]



NoSQL Developers' Guide to Infrastructure

You put in a lot of work to build databases that perform. The missing piece? Hardware! Check out our NoSQL Developers' Guide to Infrastructure today. 
 Get My Guide
Software_dev_guide_coverSoftware Developers Guide to a Resume that Gets Noticed

You've put in a lot of time learning and perfecting your craft. Your resume should reflect that. Read how you can set yourself up for success.
  Access My Copy
Learn How Open Source Adoption Can Help Keep You Employed

Download the eBook to read about the most common mistakes to avoid when creating an Open Code environment.
Read it Today!
Learn How to Pitch Your Next IT Project to Your CFO

Stop going to war with your CFO when you’re fighting the same battle. Discover how to pitch an IT project to your CFO by downloading our free eBook, The Art of Persuading a CFO. 
Get Your eBook