An Honest Approach to the Post-Breach Letter

Editors Note: This blog is a work of fiction/humor and was originally published as such on the Cylance ThreatVector Blog, May 24, 2019, by Tag Cyber.   To Our Compromised Customers: Our team at (insert company name) tried to secure its computer systems behind an...

Wi-Fi as the On-Ramp to 5G

The 5G rollout is advancing along two independent, parallel fronts: an evolutionary development of the air interface, known as 5G NR (“New Radio”), and a fundamental reconceptualization of the core network architecture. These two paths have been explicitly and...

Is Cloud Storage Right For You?

SFOriginally published on ComputerWeekly.com, April 2019, by Paul Stringfellow. Public cloud has changed the way many enterprises think about delivering their application infrastructure. Software-as-a-service (SaaS) platforms, such as Microsoft Office 365 for example,...

World Backup Day

Originally published on the Barracuda Blog, March 26, 2019, by Christine Berry Data breaches are everywhere, and no company is immune from the automated and persistent attacks from all over the world.  It’s not difficult to keep up with the news on the larger...