(847) 796-3177 [email protected]
The White House on BGP Security

The White House on BGP Security

In an era where cybersecurity threats loom larger than ever, The White House has taken a significant leap forward in addressing one of the Internet’s most critical vulnerabilities. The Border Gateway Protocol (BGP), the backbone of internet routing, has long...
YubiKey Vulnerability Discovered

YubiKey Vulnerability Discovered

A YubiKey vulnerability discovered! YubiKeys, popular security devices used for two-factor authentication, have been found to be vulnerable to cloning attacks. This discovery was made by researchers from the NinjaLab in France. What are YubiKeys? YubiKeys are small...
CrowdStrike Response to Outage

CrowdStrike Response to Outage

CrowdStrike, a prominent cybersecurity firm, recently faced criticism from its competitors following a major software update failure that led to a global IT outage. Michael Sentonas, CrowdStrike’s president, expressed his discontent with what he described as...
Avoid Using Windows Home For Your Business

Avoid Using Windows Home For Your Business

In the fast-paced world of technology in business, having the right tools and technology is crucial for maintaining productivity, security, and efficiency. One critical decision that small to medium-sized businesses (SMBs) must make is choosing the appropriate...