false

Muhammad Raza

Muhammad Raza is a technology writer who specializes in cybersecurity, software development and machine learning and AI.  

Learn 5 Min Read

Log Analytics: Analyzing Log Data 101

Breaking news: Log data can provide a ton of value, if you know how to do it right. Read on to get everything you need to know to maximize value from logs.
Learn 4 Min Read

The Shared Responsibility Model for Security in The Cloud (IaaS, PaaS & SaaS)

In the cloud, the Shared Responsibility Model is a nice way of saying “I’ll handle these things, you handle those things.” We break it down here for you.
Learn 5 Min Read

Serverless Architecture & Computing

💻 🌆 Serverless architecture is just another way of saying, “We’ll design the apps and software, you make the backend work.” Get all the details here.
Learn 4 Min Read

What Is Platform Engineering?

Platform engineering is suddenly everywhere, with DevOps experts pivoting to this new approach. Is it a short-term trend, or here to stay? Let’s find out.
Learn 4 Min Read

What is Federated Search?

Searching isn’t as easy as you think: did Google get your request? Are you pinging multiple databases? Is ChatGPT involved? Learn all about federated search here.
Learn 4 Min Read

What Does "Zero Day" Mean?

Nothing described with “zero” sounds good. That’s absolutely the case here, when it comes to zero-day vulnerabilities, exploits and attacks.
Learn 4 Min Read

Log Aggregation: Everything You Need to Know for Aggregating Log Data

Aggregating log data shouldn’t be difficult! (Thanks, technology.) Learn why you need it & how to do it right — log data can inform all parts of your business.
Learn 4 Min Read

What Is Data Analytics? The 4 Analytics Types You Need To Know

Data analytics is a whole world of information that you can glean meaning from. See the 4 types of data analytics any business practice needs today.
Learn 3 Min Read

The Triple DES Intro: Triple Data Encryption Standard

Triple DES is an encryption standard that’s NIST-approved for use through 2030. Let’s see how it works and when you want — and don’t want — to use it.
Learn 4 Min Read

Elliptic Curve Cryptography: An Introduction

Let’s see how elliptic curve cryptography works, in this digestible, less academic look that still thoroughly explains this technical topic.
Learn 3 Min Read

Honeypots Explained: Hitting Hackers Where It Hurts

Entice hackers to your system to gather cyberthreat intelligence. Get the latest on honeypot types and interactions and see why it isn’t all so sweet.
Learn 3 Min Read

Advanced Encryption Standard & AES Rijndael Explained

Learn all about AES Rijndael, today's go-to algorithm that won a NIST competition for ensuring data confidentiality — and it does much more than that!
Learn 1 Min Read

Network Security Monitoring (NSM) Explained

Network security monitoring sounds like other security measures like intrusion detection. Find out why it's not — and what makes it so useful for IT today.
Learn 4 Min Read

Cybercrime as a Service (CaaS) Explained

Perhaps unsurprisingly, cybercrime is now available for hire. Harnessing the ‘as a service’ model, find out how cybercrime can be enacted by practically anyone.
Learn 3 Min Read

Corporate Espionage: What You Need To Know

Cyber threats are not only anonymous. Find out why people you know, and perhaps partner with, are spying on you — and whether it’s corporate espionage.
Learn 4 Min Read

Denial-of-Service Attacks: History, Techniques & Prevention

DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Learn 4 Min Read

Encryption Explained: At Rest, In Transit & End-To-End Encryption

Humans have encrypted messages for millennia. Today it’s essentially part of daily life. Understand how it works — and decide if you need end-to-end encryption.