3 Types of hackers you should know about

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who ...

Healthcare IoT: Security risks involved

From mobile apps that assist with taking medicine on time to smart appliances that monitor vitals, the Internet of Things (IoT) ...

Your password may be poor — update it now

For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And ...

Serverless computing and its benefits

Small- and medium-sized business (SMB) owners make the mistake of thinking all of their problems can be solved by migrating to ...