Most Recent Articles
Georgia Should Not Authorize "Hack Back"
SB 315 would affirmatively authorize hack back behavior in Georgia, becoming the first state to do so, with the side effect of giving a normalizing boost to the federal legislation.
Getting Started in Ethical Hacking
Ethical hackers use their knowledge of vulnerabilities to help defend against criminals, hacktivists, and nation-state attackers (and sometimes, mischievous pranksters).
Axiom BendnFlex Fiber and Copper Cables
Axiom Transceivers - The OEM Alternative
ViewSonic Launches its Chromebox that Delivers an All-in-One Solution
The ViewSonic NMP660 Chromebox offers a quick out-of-the-box set-up, integrated Google management console and built-in security features, making it an ideal solution.
ViewSonic Delivers Eye-Catching Signage for Public Spaces
For an immersive, high-impact messaging solution, these displays deliver stunning 4K UHD (3840x2160) resolution, 350-nit high brightness, wide viewing angles, and dual 10W speakers.
ViewSonic Introduces New Professional and Enterprise Monitors
The VP2768-4K and VP3278-8K are designed to deliver consistent and precise color reproduction, while providing exceptional performance to ensure incredible image quality for color-critical application
The ViewSonic® SC-T25 Immune to Meltdown and Spectre Threats
The recently discovered computer chip vulnerabilities known as “Meltdown” and “Spectre” pose significant threats to any organization managing VDI environments with x86, or ARM-based client devices.
ViewSonic® Boosts its SC-T25 Based Raspberry Pi Thin Client
The new Citrix Ready workspace hub update means the already popular and high- performing SC-T25 will deliver even more compelling enterprise capabilities.
Malicious Actors: Three Steps to Success
You probably clicked on this article because you thought I was going to provide some career advice. I'll apologize now - this article outlines three steps to success for the malicious actor.
Email Phishing Has Never Been Easier
There are thousands of Nigerian princes out there, and 60-year-old men pretending to be 20-year-old women who look like supermodels.
Fighting Today’s Extortive Ransomware Threats
Worldwide cybersecurity breach headlines continue to paint quite a disturbing picture of our digital future.
The Artificial Intelligence Revolution in Cybersecurity
The answer to real threat protection is artificial intelligence (AI) based prevention. Prevention achieves everything detection can’t.
Achieving Better Security With Fewer Resources
The fact is, the traditional ways of protecting IT assets are no longer effective in today’s increasingly complex threat environment.
Video Marketing In The Problem Aware Stage
You know video is an engaging medium to tell those stories, and therefore understand that it’s worth investing the time and effort to create each piece of video content.
Deliver Outstanding Customer Service with Screen Recording
Emphasis on the consumer is due to advancements in communication and technology. Consumers are no longer limited to purchasing goods and services from local businesses.
How Digital Learning Can Help Solve These Training Challenges
With today’s technology, many companies are turning to video for new employee onboarding and training because it saves time, money, and resources.
6 Ways to Work Smarter & Faster with Visual Communication
Until workplace nap time becomes mandatory (apparently siestas help you work smarter, not harder), using visual communication can save you and your viewers time.
3 Reasons to Start Using Video in your Business
Many people feel uncomfortable making major purchases without any human interaction; but people also don’t want to be smothered by an overbearing and aggressive salesman.
What is Driving the Need to Manage & Understand Cyber Risk?