Are Your Remote Employees Embracing a Culture of Security?

While the world holds its breath for COVID-19 to run its course, many tech workers are out of the office, yet because they are able to work from almost anywhere, it’s still business—just not as usual....
Read more

What North Carolina Brought to the Table at RSA Conference

RSA Conference is where the world comes to talk cybersecurity. Even with the looming threat of the coronavirus, techies from around the world gathered in downtown San Francisco to learn about the late...
Read more

Risky Business: The Importance of Risk Assessments

Creating a secure home for sensitive data is fast becoming a business requirement, but it is often new ground to cover for many companies. Businesses have varying measures in place ranging from nothin...
Read more

5 Things to Know before Attending RSA Conference 2020

RSA Conference is security’s biggest event of the year, and there’s 45,000 techies landing in San Francisco to prove it. You can expect five full days of educational trainings with hundreds of expert-...
Read more

Why Every Black Person in Tech Should Attend AfroTech

It’s been a little over a week since I returned from Wakanda. No, not the fictional nation in the Marvel Comics series, but a real one. If you are familiar with Marvel's Black Panther, Wakanda is a fi...
Read more

How to Fight Breach Fatigue

The phenomenon becoming known as "breach fatigue" represents a warning against complacency with regard to the prevalence and success of data breaches.
Read more

Sharing Isn't Caring

Comfortable Breaches to Fit Any Lifestyle Do you travel? Do you prefer to drive or fly? Do you have a favorite hotel chain? Use the same entertainment methods from day to day? How long have you had th...
Read more

Cloud Vector – Cyber Illness, Infection, and How to Contain Them

Infectious Humour Humans have long had strong emotions about the sick, infirm, and deformed. The word monster derives from the Latin word for omen, originating from a time when sick and deformed child...
Read more

More Than A Meal: Cybersecurity Lessons from the Meals on Wheels National Conference

Each year, Meals on Wheels of America hosts senior nutrition and nonprofit professionals from across the country at their annual conference to convene around one thing: how to better support our senio...
Read more

A Deduction of Errors

Hacking by Design As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude scenarios...
Read more