Nvidia (an artificial intelligence chip manufacturer) has become the most valuable company in the world, surpassing Apple and Microsoft. They dominate the market in AI chips, especially those needed to train and run AI software such as ChatGPT. The acceleration of Nvidia over the past year has some experts anticipating that this is just the […]
The Different Types of Data Breaches
Do YOU Know The Different Types of Data Breaches? We all know what a data breach is, but do you know how many ways a breach can happen? Here are some of the most popular techniques currently being used. Physical Breach -The name says it all, a physical breach involves the loss or theft of […]
Partner Profile | Scantek
What are your plans to go PAPERLESS in 2023? Are any of these your goals? Secure, Remote Access to all of Your Files Simplify and Automate your Retrieval of HR, Payroll, Financial Records, Inbound/Outbound Mail, and Important Documents to Locate Easily Implementing a Safe and Compliant Document Management Software Solution Now is the time for a […]
Guest Post: Last Mile Communications: Ownership and Security with Lochbox
Last Mile Communications: Ownership and Security with Lochbox INTRODUCTION In 2017, the US Department of Homeland Security issued a security report (DHS, 2017, p. 53) strongly discouraging the use of provably-open mobile calls and SMS text messages while declaring the use of landlines as no more secure. Convenience and complacency are the two main factors […]
Guest Post: Air-Gapping and Why is it Essential
What is Air-Gapping, and Why is it Essential for Security Purposes? By Jerry Sanchez | Founder and Managing Partner of Framework Security One of the most important things to protect against cyber-attacks are disconnected networks. Those who work in IT security refer to these as “air-gaps”, meaning there are no network interface controllers connected […]