Nathan Sykes

Edge Computing and the Future of IoT

As the Internet of Things (IoT) begins to take shape and its future becomes clearer, IT experts realize that mainstream cloud computing isn’t enough. It’s not fast enough to handle real-time data ...
New in Nessus: Elliptic Curve Cryptography with SSH

New in Nessus: Elliptic Curve Cryptography with SSH

Cryptography is like finding and patching system vulnerabilities. Both are a race. In the former, the race is between mathematicians finding efficient, hard-to-reverse computations and opposing mathematicians solving hard numerical problems to ...

Security Research Ideas to Improve Post-Graduation Outcomes

One of the ways I try to give back to the community is by using my writing to be the resource I wish I had earlier in my journey. I have constraints ...
8 Reasons to Use a VPN | Avast

8 Reasons to Use a VPN | Avast

A lot of people (including us!) will tell you that you need to get a VPN (Virtual Private Network) to ensure your privacy and security when surfing the web. A VPN like ...
   Via   the two Facebook-Avoiding Comic Genii -    Nitrozac   and   Snaggy   - at   The Joy of Tech®!

The Joy of Tech®, ‘Why Are You Still On Facebook’

Via the two Facebook-Avoiding Comic Genii - Nitrozac and Snaggy - at The Joy of Tech®! Permalink ...
4 reasons for slow mobile internet speeds

4 reasons for slow mobile internet speeds

Have you ever gotten frustrated with your phone because the browser took more than five minutes to load? Before you start blaming your old phone, check out these four reasons that might ...
Back up your SaaS Data Because SaaS Providers Don't

Forrester Urges Organizations to Use Cloud-To-Cloud Backup For SaaS Data Protection

Forrester predicts that the SaaS market will grow to $157 billion in 2020 as companies continue to follow the trend of moving their data from on-premises to the cloud. Have you made ...
targets.jpg

Silent Librarian: More to the Story of the Iranian Mabna Institute Indictment

Last Friday, Deputy Attorney General Rod Rosenstein announced the indictment of nine Iranians who worked for an organization named the Mabna Institute. According to prosecutors, the defendants stole more than 31 terabytes ...
Trusted Computing Group Welcomes Korea Internet and Security Agency (KISA) as a Government Liaison Member

Trusted Computing Group Welcomes Korea Internet and Security Agency (KISA) as a Government Liaison Member

KISA to Contribute to IoT security and Resiliency and Global Standards Seoul, Korea, March 26, 2018 – Trusted Computing Group (TCG), a global security standards organization and an approved Publicly Available Specification ...