Is That A Business Continuity Plan in Your Pocket…Or A Bunch of Jargon?

Is That a Business Continuity Plan in Your Pocket or a Bunch of Jargon? Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of [...]

“Password1” Is Most Common – Trustwave Security Report

Trustwave  just released their 2015 Global Security Report, a comprehensive look at worldwide Internet security. A few key findings from their security testing: - 98% of applications tested were vulnerable - 20: Median number of vulnerabilities per application - 95% of mobile applications were vulnerable - 6.5: Median number of vulnerabilities [...]

Webinar: Famous Hacker on Email Security

Our email encryption partner, Zix, will be having a conversation about the inherent email security with the world's most famous hacker, Kevin Mitnick, on June 17th, 2015. This notorious black hat turned white hat hacker will share thought-provoking insight on the simplicity of hacking unencrypted email, even demonstrating an optical [...]

ZMap Scans the Entire Internet In Less Than 1 Hour

ZMap, a software tool developed by a team of researchers from the University of Michigan, can scan the entirety of the internet in under an hour  to reveal details about the roughly 4 billion devices online. ZMap has been used to measure the scope of significant flaws across the connected universe, [...]

Matt & Amy Discuss the Microsoft Surface 3 Tablet

The Microsoft Surface 3 Tablet Microsoft unveiled its latest tablet, the Surface 3, which now has a full version of Windows.  Previous models ran “RT” versions of Windows, which were not capable of running full Windows apps. Microsoft is also tying Office 365 subscriptions to the purchase of the tablet [...]