Ron Miller

All posts by Ron Miller

Ron Miller is a freelance technology reporter and blogger. He is contributing editor at EContent Magazine and enterprise reporter at TechCrunch.

Helping SMBs comply with GDPR and other privacy laws

Helping SMBs comply with GDPR and other privacy laws

As cybersecurity incidents continue to increase globally, governments are starting to step in to protect their citizen’s personally identifiable information (PII). GDPR went into effect in the EU last year and the California Consumer Privacy Act (CCPA), which is set to launch on...

/ September 16, 2019
You can experiment with blockchain development tools for free

You can experiment with blockchain development tools for free

You might easily have missed it this week, when Kadena, a Brooklyn, New York startup, announced a free private Blockchain as a Service tool in the Azure Marketplace, but it could be more relevant to you than you think. When...

/ September 2, 2019 / 1 Comment
How DevOps savvy is your organization?

How DevOps savvy is your organization?

The term DevOps has been bandied about for several years now, and while its meaning is open to debate, it’s basically a set of principles that help establish roles for developers and IT to build software in a continuous delivery...

/ August 28, 2019 / 1 Comment
How RPA can help drive automation in legacy businesses

How RPA can help drive automation in legacy businesses

Increasingly, companies are looking for ways to automate repetitive internal processes, but most can’t simply rip and replace the systems that they have in place and go for the latest and greatest AI technologies. It’s simply too risky, disruptive, and...

/ August 19, 2019 / 1 Comment
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019 / 1 Comment
Email is ripe for hacker exploitation

Email is ripe for hacker exploitation

Hackers and scammers have learned over the years that the best way to get your employees’ attention is through a cleverly disguised email with a malware-infested link — sometimes asking for ransom. Regardless, it’s often employees who click these links...

/ August 2, 2019
Halt! Who goes there? Helping clients manage passwords

Halt! Who goes there? Helping clients manage passwords

The idea of passwords goes back long before computers, back to when you had to prove you were a friend by giving the secret word to get by the guard. Much later, it provided a way to prove you were...

/ July 19, 2019
The state of security does not feel terribly secure

The state of security does not feel terribly secure

It was yet another week of bad security news. We heard about hackers who had been breaking into cell phone networks and stealing call records for years. Then, we heard about vulnerabilities in the Global Entry System. It hasn’t resulted...

/ July 1, 2019
Recent acquisitions suggest data really could be the new oil

Recent acquisitions suggest data really could be the new oil

We are fond of tech metaphors that help us understand the world. One such metaphor is that data is the new oil. Essentially it means data has so much value, that when mined and refined, it could have great value...

/ June 25, 2019
Small businesses are increasingly looking to MSPs

Small businesses are increasingly looking to MSPs

Research suggests that the already substantial MSP market is growing at a fast clip. That’s because more companies are choosing to outsource their IT functions, especially as the technology mission changes to managing cloud services and building an increasingly automated environment.

/ June 18, 2019