Insight into how digital learning technology will shape schools in the future
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    The reputation of the “Dark Web” perhaps exceeds its reality
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Make secure transactions with the best VPN service
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Kicking off a cloud-first strategy without considering security measures can cloud your judgement
                    
			            - By Robert  Huber
 - Jun 19, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    This online 90-minute training is designed to educate startup companies and social media companies about how terrorists may seek to exploit their platforms. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Educational institutions are a data treasure trove.
                    
			            - By Isaac  Kohen
 - Jun 12, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IP security cameras are connected to the internet. That's what allows users to access them remotely, to check in on their business, and what lets manufacturers update device software without having to physically visit their business.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Apple has announced new settings to strengthen security on your mobile, laptop and tablet devices.
                    
			            - By Sydny  Shepard
 - Jun 06, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Several companies are opting for short-term reactive cybersecurity despite high profile ransomeware attacks.
                    
			            - By Sydny  Shepard
 - Jun 05, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Over the last decade, the cloud has revolutionized the way businesses operate. Today, modern enterprises are turning to a hybrid IT environment, leveraging the best of both worlds—the scalability of cloud infrastructure and the control of on-premises systems.
                    
			            - By David  Meltzer
 - Jun 01, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Researchers find nearly half a million routers have been infected by malware.
                    
			            - By Sydny  Shepard
 - May 29, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    If your business has customers who live in the European Union, you have an important deadline approaching.
                    
			            - By Jay   Hamilton
 - May 21, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A report by Verizon has found that 76 percent of breaches are financially motivated, and 68 percent of those breaches took months or longer to discover.
                    
			            - By Sydny  Shepard
 - May 17, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    DHS works to create cybersecurity plan that encompasses all data.
                    
			            - By Sydny  Shepard
 - May 16, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Patrons of Chili's might have had their credit and debit card data hacked earlier this year.
                    
			            - By Sydny  Shepard
 - May 14, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A VPN creates an encrypted connection between your device and the remote private network. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A bug in the Twitter system caused people's passwords to be kept unmasked in an internal log.
                    
			            - By Sydny  Shepard
 - May 07, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    What if we could listen in on network traffic instead of just looking at it on graphs?
                    
			            - By Sydny  Shepard
 - May 03, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Security researchers found that certain models from Volkswagen could be hacked and remotely controlled.
                    
			            - By Sydny  Shepard
 - May 02, 2018
 
		            
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Researchers at Checkmarx were able to build an Alexa skill which could be used to spy on users within earshot. Amazon has now closed the loophole.
                    
			            - By Sydny  Shepard
 - Apr 26, 2018