pokemon go and pikachu dolls

Authorization, Authentication, and Pokemon-Go

When I opened up my news feed last week, 80% of the updates and…
credit-card-1591492_640

Think Twice Before Donating Online

Donating Online From a Security Perspective Have you ever made…
ddos attack net of thieves over a computer desk

XSS: The Con-Artist

“XSS” is an acronym you hear often in the field of information…
office-96107_1920

"Website" Meaning for Startup CEOs?

You might hear a lot of CEOs saying, “My website is powered…
employee using laptop and coding injection

6 Steps to Create a Secure Website

There are roughly one billion active websites online, or one…
profile

Column-Level Encryption: What to Consider

There’s no single, magical, ultimate solution to keeping your…
car security using gps or navigation

Security in IoT

Since its first introduction 15 years ago, the Internet of Things…
profile

DDoS Attacks: Top 5 Industry Targets

If you take a look in any online hacking forum, you’ll find…
Boy Programming On Computer With Multiple Monitors And Laptop On Desk

What's a Zero-Day Attack?

Zero-day attack, as cool as it may sound, is one of the most…
clouds

Protect Sensitive Data within the Cloud

It’s pretty clear by now that the next frontier for online…