Today we use passwords to “unlock” access to our most important private information, but even 2,000 years ago people needed a secure way to “lock” and “unlock” secret messages between one another. Since we use more modern methods of encryption for securing information today, understandin...
While no business hopes to need it, a disaster recovery plan is crucial to ensuring a company’s digital health—especially in the worst of circumstances. While some businesses keep their disaster recovery planning and operations in-house, others choose to outsource it. A disaster recovery as a se...
Last month two companies, Twilio and Cloudflare, were attacked by cyber criminals. While it may be tempting to dismiss these attacks as simply being the latest in a long list of high-profile attacks that have occurred over the last few years, there were several aspects about the Twilio and Cloudflar...