Uncategorized

 

PODCAST: Former White House CIO — companies need cyber defense strategy

By Byron Acohido Theresa Payton honed her cybersecurity skills as the White House’s first female chief information officer, under President George W. Bush. Payton is now president and CEO of cybersecurity consulting company Fortalice Solutions. I had the chance to interview her at the recent Enfuse 2017 cybersecurity conference in Las Vegas. We discussed how […]

What you should know about the Top 5 free VPNs

By Andrey Doichev (Editor’s note: Andrey Doichev is a self-described VPN enthusiast who analyses and tests different VPN software. The full version of this article was originally posted here. Commentary and opinions are expressly Doichev’s.) Who likes FREE Software? I sure do. And I reckon you do too! In times where ISPs can sell your […]

PODCAST: Why small- and mid-sized businesses should strongly consider using an MSSP

By Byron Acohido How Armor got started stands out. Founder and CEO Chris Drake was serving as a paratrooper in the U.S. Army’s 82nd Airborne Division based out of Fort Bragg, North Carolina, when he was selected to build some of the Army’s first private and secure websites. After his military service, Drake started a […]

VIDEO: Why the rising use of biometric authentication is driving states to regulate privacy

By Byron Acohido Using biometrics to verify one’s identity is no longer something you’d expect to see only in a Hollywood depiction of a dystopian future. Biometric identification has been in practical use for a while now, and the technology is getting more sophisticated every day. As you might expect, privacy concerns have arisen along […]

PODCAST: Putting machine learning to work ferreting out data anomalies

By Byron Acohido Machine learning has been a staple of our consumer-driven economy for some time now. When you buy something on Amazon or watch something on Netflix or even pick up groceries at your local supermarket, the data generated by that transaction is invariably collected, stored, analyzed and acted upon. Machines, no surprise, are […]

Q&A: Why you should think twice about taking your laptop, smartphone on business travel

By Byron Acohido International business travelers take heed: Starting now, and even more so going forward, you’ll need to carefully consider how your computing devices serve as a conduit to sensitive company data. This includes everything stored directly on your smartphones and laptops—and everything reachable from your personal computing devices that may be stored in […]

PODCAST: How built-in application security can improve network security

By Byron Acohido There was at time 15 years ago when we fully expected the latest, coolest software to come riddled with aggravating bugs. Consumers were trained to expect that the software vendor would fix the glitches in version 1.1 or 1.2. Software developers today remain under more pressure than ever to rush to market […]