This website uses cookies to ensure you get the best experience on our website. Learn more

Cybersecurity Articles

Computer Security Feature Essays

Chris Banyon
Chris Banyon
Chris Banyon's Blog

Bio: Who is Brian Krebs

Brian Krebs is an investigative journalist and cybersecurity expert, known for his coverage of cybercrime and computer security issues.

Bio: Who is Roger Grimes

Roger Grimes is a well-known cybersecurity expert and author. He has been working in the field of computer security for over 30 years, and is considered one of the leading experts on the subject of computer defense and security.

Bio: Who is Kevin Mitnick

Kevin Mitnick is a computer security consultant, author, and reformed hacker. He gained notoriety in the 1990s as one of the most wanted computer criminals in the United States.

Bio: Who is Stu Sjourwerman

Stu Sjouwerman is a cybersecurity expert and the founder and CEO of KnowBe4, a company that provides cybersecurity awareness training and simulated phishing attacks to organizations.

Bio: Who is Bruce Schneier

Bruce Schneier is a highly regarded security technologist, cryptography expert, and author who has made significant contributions to the field of cybersecurity.

BIO: Who is Perry Carpenter

Perry Carpenter is a cybersecurity expert who has made significant contributions to the field through his work as an author, speaker, and consultant.

How Cryptocurrency Poses a Threat to Cybersecurity

Cryptocurrency, also known as crypto coins or digital currency, has gained popularity in recent years as a decentralized form of currency that operates independently of governments and financial institutions.

How to Prevent a DDoS Attack

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server or network by overwhelming it with a flood of Internet traffic.

Ransomware Prevention Measures for Your Organization

One common method of delivering ransomware is through phishing emails. These are emails that appear to be from a legitimate source and contain a malicious attachment or link.

Key Aspects of Applications Security

Application security is the practice of protecting applications and the data they process from unauthorized access, use, disclosure, disruption, modification, or destruction.

Do you wish to contribute a technical article on cybersecurity? If so, you'll get your own blog category on our site and your posts may be shared across our IT Specialist Network platform including social networks. Click to read the guidelines.