top of page
Search
The Tech Platform
Dec 5, 2020
Integrated Risk Management (IRM)
Integrated risk management (IRM) is a set of proactive, business-wide practices that contribute to an organization's security, risk...
The Tech Platform
Nov 30, 2020
Major Types of Server Hardware and their Pros and Cons.
Servers protect data, centralize resources and enable remote worker productivity, but buyers must understand which server types works...
The Tech Platform
Nov 30, 2020
How does a Web server model differ from an application server model?
A Web server model and an application server model share many similarities but require different defense methods. Each model, for...
The Tech Platform
Nov 30, 2020
How to encrypt and secure a website using HTTPS
The web is moving to HTTPS. Find out how to encrypt websites using HTTPS to stop eavesdroppers from snooping around sensitive and...
The Tech Platform
Sep 18, 2020
Microsoft addresses 129 security vulnerabilities in its September 2020 Patch Tuesday update
Twenty-three are rated as 'Critical', many affect SharePoint Microsoft addresses 129 security vulnerabilities in its September 2020 Patch...
The Tech Platform
Aug 22, 2020
Internet Explorer Is Being Killed Off Later This Year
Microsoft has announced that it'll be ending support for Internet Explorer 11 on November 30th, quietly putting a bullet in the back of...
The Tech Platform
Aug 22, 2020
The Best Password Managers to Secure Your Digital Life
Keep your logins under lock and key. We picked our favorites for PC, Mac, Android, iPhone, and web browsers. PASSWORD MANAGERS ARE the...
The Tech Platform
Aug 18, 2020
Attackers Horn in on MFA Bypass Options for Account Takeovers
Legacy applications don’t support modern authentication — and cybercriminals know this. An uptick in business email compromise attacks is...
bottom of page