Google Outage 2020: What Happened?
Users of Gmail, Google Drive, and YouTube around the world were affected by an unexpected outage on December 14, 2020. On Gmail, people were informed that their accounts were temporarily …
Freelance Blog Writer | Cyber Security Content Writer | Ireland
Users of Gmail, Google Drive, and YouTube around the world were affected by an unexpected outage on December 14, 2020. On Gmail, people were informed that their accounts were temporarily …
Often, the mechanism by which a malicious party gains access to a network is by getting an unknowing victim to run unsecured code inside that network. The third party can …
Read moreWhy Code Signing Provides a False Sense of Security
This hypothetical scenario shows how easy it could be for an attacker to establish the pretext for gaining entry into a corporate network using a Word macro virus. It is …
Cybersecurity software companies have a habit of latching on to certain buzzwords or other jargon terms in order to attract new business. You’ve probably heard of SIEM solutions if you …
On this page, I want to talk about a fascinating area of information security, which is ethical hacking. I’ll define what it is, talk about the three types of hackers, …
When a business decides to run apps in the cloud or otherwise use cloud infrastructure, a big challenge is managing resources across disparate systems. It’s worth remembering that companies rarely …
Replication simply means copying data from one primary storage location to another location. This post clarifies the differences in the synchronous vs asynchronous replication of data. Data Replication in the …
Monitoring the cloud is a crucial activity for any business that cares about maximizing performance and minimizing the costs of cloud computing. Monitoring is about maintaining visibility and transparency into …
Sometimes there are solutions in IT that solve so many problems, it’s hard to believe that not every business uses those solutions or even knows about them. Load balancing is …
On July 15th, 2020, leading social media platform Twitter experienced a sophisticated cyber attack that caused untold disruption to the platform. The attack itself appears to be an example of …
Read moreTwitter Security Breach 2020: A Successful Social Engineering Attack