TrueNAS vs FreeNAS

TrueNAS vs. FreeNAS: What is the Difference?

Alas, dear reader, the title of this article is a bit misleading. There is no longer a NAS operating system named FreeNAS, nor one named simply TrueNAS. They exist under new monikers, but it's...
The Vulnerabilities of Electronic Voting Systems

The Vulnerabilities of Electronic Voting Systems

Electronic voting systems must perform one of the toughest jobs on the planet. It’s not counting votes. That’s easy. The toughest part is convincing people that the results are correct. Electronic Voting Systems Electronic Voting systems...
Hacker's Laptop

Five Great Free Security Tools You Should Check Out

As important as it is, cybersecurity is still constrained by budget. Thankfully there are some fantastic free tools that you can add to your cybersecurity arsenal to help you protect your network. Free and Open...
Network Cables

What is Endpoint Security?

Network endpoints are computers, laptops, and mobile devices such as tablets and smartphones. If the threat actors compromise your endpoint, they have access to the network. Here’s how to keep them secure. Endpoints and Security The...
Brown envelope with a top secret stamp

What is Information Security?

Information security and cyber security are terms that get used interchangeably, but are they really the same thing? We explain the subtle differences between these two closely allied and yet different disciplines. Same But Different? Cyber...
artificial and human had reaching toward each other

Artificial Intelligence: The Hackers’ New Weapon

Malware is getting smarter---literally. Threat actors are using artificial intelligence to create cyberthreats capable of learning and acting as autonomous agents that can change their tactics as required to complete their mission. What is Artificial...
Signal Messenger Logo

Signal Messenger: Simple Security, Guaranteed Privacy, Great Functionality

In our hyper-connected, always-on world, privacy is in everyone’s thoughts. Instant messaging is the dominant tool for remote conversations. How can we use instant messaging and maintain our privacy? By using Signal. Signal Messenger Signal is...
shielding your computer from malware during COVID-19

Shielding Your Computer From Malware During the COVID-19 Pandemic

Hackers are the bad eggs in the cyber world that try to make use of any opportunity to steal information or money. Characteristically, they latch onto vulnerabilities and security loopholes to exploit computer users....
Top Microsoft Office 365 Backup Solutions

Top 3 Microsoft Office 365 Backup Solutions

Mention data safety, and backup will instantly spring to mind. What is not immediately available, even to seasoned IT professionals, is information about what makes a good backup solution. With more businesses embracing Microsoft...
Security Alert over program code

What is Penetration Testing?

How can you get an objective measurement of the effectiveness of your cyber defenses? Are the measures you’ve put in place as impenetrable as you hope? Penetration testing gives you the facts. Measurement is Part...

Latest posts

TrueNAS vs FreeNAS

TrueNAS vs. FreeNAS: What is the Difference?

Alas, dear reader, the title of this article is a bit misleading. There is no longer a NAS operating system named FreeNAS, nor one...
The Vulnerabilities of Electronic Voting Systems

The Vulnerabilities of Electronic Voting Systems

Electronic voting systems must perform one of the toughest jobs on the planet. It’s not counting votes. That’s easy. The toughest part is convincing...
Hacker's Laptop

Five Great Free Security Tools You Should Check Out

As important as it is, cybersecurity is still constrained by budget. Thankfully there are some fantastic free tools that you can add to your...
Network Cables

What is Endpoint Security?

Network endpoints are computers, laptops, and mobile devices such as tablets and smartphones. If the threat actors compromise your endpoint, they have access to...