Ryan Francis

Contributor

Ryan Francis has been in the tech publishing field for 17 years.

7 manieren om mobiele apps dicht te timmeren

Gebruik tokens, encryptie, keychains en meer bij het schrijven van apps.

Profiling 10 types of hackers

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

7 tips to strengthen online security

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

Top 5 email security best practices to prevent malware distribution

Top 5 email security best practices to prevent malware distribution

With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies...

10 things to worry about when your vendor divests

10 things to worry about when your vendor divests

Although your vendor’s divestiture is out of your control, you can at least do your due diligence in limiting any negative impact to your company. With that in mind, ZL Technologies lists 10 things you should worry about if your...

5 tips om je te beveiligen tegen scammers op LinkedIn

Beter omgaan met je privacy- en securitysettings.

Fragmentation: the silent killer in security management

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

7 universal rules of threat intelligence

7 universal rules of threat intelligence

Recorded Future will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

Huur een DDoS-dienst om je vijanden plat te leggen

IoT-botnets gaan voor meer problemen zorgen.

Seven tips for developing a powerful data disaster plan

Seven tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an...

Disaster recovery: How is your business set up to survive outages?

Disaster recovery: How is your business set up to survive outages?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

Would killing Bitcoin end ransomware?

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

8 steps to regaining control over shadow IT

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

Why DRaaS is the better defense against ransomware

Why DRaaS is the better defense against ransomware

Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack.

7 manieren waarop mobiel beheer je privacy verknettert

MDM is vaak niet transparant voor werknemers, maar heeft ingrijpende toegang.

10 IT-eigenschappen die je als IT'er moet ontwikkelen

De sector verandert en de eisen aan IT'ers veranderen mee.

7 simpele trainingstips voor betere beveiliging

Je personeel bewust maken hoeft niet duur en ingewikkeld te zijn.

7 musts for any successful BYOD program

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

10 ways tech pros can take charge of their professional development

10 ways tech pros can take charge of their professional development

CompTIA, the technology industry’s leading trade association, has identified 10 abilities it believes IT professionals will need to be successful in the technology world to come.

7 musts for any successful BYOD program

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

Load More