Category: Featured
The Creeper and the Reaper make cybersecurity history
“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”
Ask an MSP Expert: Overcoming human error to secure the cloud
Data breaches in the cloud are becoming more common, impacting industry giants and small players alike, and MSPs now have to dig deeper to prevent them.
Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”
Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...
Tech Time Warp: National Cybersecurity Awareness Month turns 17
For the past 17 years, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) have used the month of October to educate Americans about the importance of good cybersecurity habits. Much has changed since the...
Tech Time Warp: CompuServe brings online access to consumers
“Last night we … had a party for 11 people in nine different states and only had to wash one glass.” This isn’t a description of a Zoom happy hour. It’s the tagline of a 1983 magazine ad for CompuServe,...
Tech Time Warp: WebTV, your smart TV’s ancestor
Most of us have relied on streaming services to stay semi-sane during COVID-19 shutdowns. Did you know your smart TV has its roots in WebTV, a product that was truly ahead of its time (and its available bandwidth)?
Finding new ways to deal with inevitable tech disasters
The one thing for certain is that when it comes to technology, there will come a time when disaster will strike, and as your client’s IT shop, it’s going to be up to you to fix it. You must have...
Pioneers in Tech: Radia Perlman and the Spanning Tree Algorithm
You may not have heard of the “Spanning Tree Algorithm,” but it’s the backbone of the Ethernet technology we enjoy and rely upon today. The algorithm, also known as the “Spanning Tree Protocol” or STP, was the brainchild of Radia...
Continuous transformation: Streamline ops and deliver more value
Continuous transformation in IT operations are more than just industry buzzwords. This is in fact a critical survival tool for any cloud or IT solution deployment today. To achieve continuous transformation, however, innovation must continue well beyond a migration to...
Tech Time Warp: Quite the Hotmail hack, eh?
You might not want to admit it, but you may still have a Hotmail account kicking around. Once your premier account—perhaps an upgrade from AOL—it may now be your throwaway address. Once, though, Hotmail was hip—and quite a target for...