Justin Dolly becomes Chief Security Officer at Sauce Labs
Wednesday, February 12, 2020 by Brittany Hainzinger
Sauce Labs Inc. announced the appointment of Justin Dolly as chief security officer. A security industry veteran with more than 20 years of experience, Dolly will develop, implement, and enforce the company’s long-term security strategy, ensuring its customers have the highest level of protection to support their digital goals. The hiring of Dolly follows the rece...
Overcoming IoT security threats to achieve better ROI
Monday, January 8, 2018 by Richard Harris
With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...
Tips for securing container deployments
Friday, September 1, 2017 by Richard Harris
Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...
10 reasons to hide your IP address
Wednesday, March 1, 2017 by Richard Harris
You have an IP address if you are reading this. Your IP (Internet Protocol) address is simply a series of numbers separated by dots (or octets) that represent where you are, or "what network" you are originating traffic from. Now, you might be behind a firewall - which means you have a NATed IP address, in fact all computers behind your NAT firewall will have the same p...
Ways you can protect yourself on the Internet
Thursday, February 23, 2017 by Richard Harris
Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...
How the new US administration will effect Internet privacy
Thursday, February 2, 2017 by Austin Harris
NordVPN has observed a notable increase in inquiries immediately after the U.S. election and a stable growth of interest from Americans ever since.As the new U.S. President starts his four-year term, many wonder what will be the new policy on government surveillance of ordinary citizens. President Donald Trump, while being vague on his views concerning Internet privacy,...
Silicon Labs Gecko MCU Platforms Focusing on IoT Security and Energy
Tuesday, January 5, 2016 by Richard Harris
Silicon Labs has introduced two new EFM32 Gecko microcontroller (MCU) platforms that focus on security and energy management for IoT-connected devices. The new Jade Gecko and Pearl Gecko MCUs combine a hardware cryptography engine, low-energy modes, an on-chip dc-dc converter and scalable memory options. The EFM32 Jade and Pearl Gecko MCUs microcontrollers target e...
Why DDoS Attacks Have Doubled in the past Year
Saturday, August 22, 2015 by Stuart Parkerson
Akamai Technologies has released its Q2 2015 State of the Internet – Security Report. This quarter’s report, which provides analysis and insight into the global cloud security threat landscape. Most notably, the data show the threat posed by distributed denial of service (DDoS) and web application attacks continues to grow each quarter.John Summers, vice president, Clou...
Let's Encrypt Offers Free, Automated and Open SSL Security Certificate Authority for Websites
Tuesday, April 28, 2015 by Stuart Parkerson
Let’s Encrypt is a free, automated, and open certificate authority from the Internet Security Research Group (ISRG) which is hosted by The Linux Foundation. Let’s Encrypt allows website owners to obtain SSL security certificates within minutes, eliminating the hassle getting a certificate to set up a secure website. Let’s Encrypt automates the process letting site opera...
Tough gig making a living as an app developer
Wednesday, November 14, 2012 by Richard Harris
ROSEDALE, Md. — Shawn and Stephanie Grimes spent much of the last two years pursuing their dream of doing research and development for Apple, the world’s most successful corporation.THE iECONOMYA series examining challenges posed by increasingly globalized high-tech industries.More in This Series »GraphicJob Prospects for App WritersRelatedWhat It Takes to Be an Ap...