St Louis, MO, USA
He has had several editorial management positions for both print and online properties in the enthusiast, gaming, IT, network, channel, and electronics industries, including the editor-in-chief of Network Computing print, Digital Landing.com, and Tom's Hardware.com. He currently writes for PC Magazine, Slashdot, Computerworld, Techtarget and Network World.
Tips on how to evaluate different cloud computing providers
The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.
Securing your Docker and container infrastructure will take a combination of policies, explicit tools and careful examination of your apps. Here’s how to do it.
Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them.
Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out.
If you are trying to improve global access to your applications, you have probably considered one of several solutions: stringing together your own private network, purchasing WAN optimization appliances, or using a managed cloud-based service provider. Figuring out the benefits of each solution isn't easy and it is hard to test for variations in Internet connectivity, specific applications and other conditions.
A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.
The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging.
Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.
Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach.