Latest UpdatesTechnology

Beyond the Moat: Ditching VPNs for a Zero Trust Security Architecture

For years, the gold standard for secure remote access was the Virtual Private Network (VPN). We built digital fortresses, complete with strong firewalls as our moats, and used VPNs to create secure drawbridges for trusted employees to cross. Once inside, they were assumed safe and granted broad access to internal resources. This “castle-and-moat” strategy worked relatively well when…
Read more

Beyond Passwords: A Guide to the Different Types of 2-Factor Authentication

Don't Toss It! How to Turn Your Old Wi-Fi Router into a Repeater

Internet

Facebook Hacker Cup For Hackers Around The World

Facebook is challenging software geeks around the world to show their talent in the online social networking king’s first “Hacker Cup.” The contest consists of a set of online rounds that kick off in January and a final round in March held at Facebook’s campus in the Silicon Valley city of Palo Alto. Facebook will fund the airfares and accommodation for 25 contestants in…
Read more

Beyond Passwords: A Guide to the Different Types of 2-Factor Authentication

Don't Toss It! How to Turn Your Old Wi-Fi Router into a Repeater