This website uses cookies to ensure you get the best experience on our website. Learn more

Cybersecurity Articles

Computer Security Feature Essays

The Major Security Features Built into Microsoft Windows

Microsoft Windows is one of the most widely used operating systems in the world, with millions of users relying on it for personal and business use.

Bio: Who is Brian Krebs

Brian Krebs is an investigative journalist and cybersecurity expert, known for his coverage of cybercrime and computer security issues.

Why it's Essential to Backup Microsoft 365

Backing up files and apps is a critical aspect of modern computing and is especially important when using Microsoft 365.

How ChatGPT Will Help Change the World

ChatGPT, a large language model developed by OpenAI, is poised to have a significant impact on the world. As a language model, ChatGPT is capable of understanding and generating human-like language, making it a valuable tool for a wide range of applications.

Password Management Company Leads the Pack with Passkey Technology

1Password is a popular password manager that offers a passkey-based authentication system, which provides users with a secure and easy way to manage their passwords.

The National Security Agency's Role in Cybersecurity

The National Security Agency (NSA) is a U.S. intelligence agency that is responsible for the collection and analysis of foreign communications and foreign signals intelligence.

Nation State Cybersecurity Threats

One of the most significant nation-state cybersecurity threats is advanced persistent threats (APTs). APTs are long-term, targeted attacks that are often carried out by nation-states or state-sponsored hacking groups.

Ransomware Protection Playbook by Roger Grimes

"Ransomware Protection Playbook" by Roger Grimes is a comprehensive guide to protecting against one of the most persistent and devastating threats to businesses and individuals in the digital age: ransomware.

The Technology Behind Passkey Encryption

FIDO2 Passkey technology is the latest development in the field of authentication, offering enhanced security and convenience to users.

Book Review: The Art of Invincibility by Kevin Mitnick

The Art of Invincibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data is a book written by Kevin Mitnick, one of the most famous hackers of all time, who turned into a security consultant.

Bio: Who is Roger Grimes

Roger Grimes is a well-known cybersecurity expert and author. He has been working in the field of computer security for over 30 years, and is considered one of the leading experts on the subject of computer defense and security.

Bio: Who is Kevin Mitnick

Kevin Mitnick is a computer security consultant, author, and reformed hacker. He gained notoriety in the 1990s as one of the most wanted computer criminals in the United States.

Bio: Who is Stu Sjourwerman

Stu Sjouwerman is a cybersecurity expert and the founder and CEO of KnowBe4, a company that provides cybersecurity awareness training and simulated phishing attacks to organizations.

Bio: Who is Bruce Schneier

Bruce Schneier is a highly regarded security technologist, cryptography expert, and author who has made significant contributions to the field of cybersecurity.

BIO: Who is Perry Carpenter

Perry Carpenter is a cybersecurity expert who has made significant contributions to the field through his work as an author, speaker, and consultant.

Do you wish to contribute a technical article on cybersecurity? If so, you'll get your own blog category on our site and your posts may be shared across our IT Specialist Network platform including social networks. Click to read the guidelines.