Europe
Asia
Oceania
Americas
Africa
I’m not a techie. I don’t code. I like my tools to come with clear, concise instructions. I don’t want to spend hours configuring a system, and if your product requires me to purchase a second product
Everyone who regularly reads this column knows that SMS text messages are not the recommended method of delivering two-factor authentication codes. There’s a good reason for that: in terms of security
Jon Bentley urges a return to good old face-to-face communication to combat rising cybersecurity threats
Where to start with the announcements and releases from Apple’s WWDC conference? Rather than get mired in deep detail, there are a couple of important underlying issues. The new look and feel, especia
Of all the classes of software we put our faith into, I believe the most misunderstood and often downright dangerous is the storage sync utility. With such a wide diversity of brands, the most importa
Small and medium businesses (SMBs) need to get serious about network security if they want to prosper. Today’s threat landscape is constantly evolving, with attacks rising at an unprecedented rate, th