18 Sep 2020

Protecting Global Networks and Identifying Threats

Ashli LoppNews  

As the dark web becomes multi-national, US government agencies are racing to identify who are responsible for the latest ransomware attacks. Dark Web Coalition Cybercriminals have been collaborating for decades and over the past few … Read More

04 Sep 2020

How Contact-Tracing Apps Work

Ashli LoppNews  

Many contact-tracing apps have popped up since the Coronavirus Disease 2019 (COVID-19) pandemic began. Discover how their technologies influence how they operate. Contact tracing has been used for years to combat infectious diseases. It involves … Read More

04 Sep 2020

What You Need to Know about the Zero Trust Model

Ashli LoppNews  

Network infrastructures are getting more complex and thus harder to secure with traditional network security tools. Fortunately, there’s a viable alternative: the zero trust model. Here is what you need to know about this model. … Read More

04 Sep 2020

Huawei Ban Spreads as 5G Network Approaches Rollout

Ashli LoppNews  

Trade constraints interfere with mobilization of 5G network platform due to concerns of espionage, semiconductor sales and backdoor security risks. Trade Restrictions The political strain between the United States and China has been in the … Read More

21 Aug 2020

How to Protect Your Mobile Device from Malicious Apps

Ashli LoppNews  

Researchers recently discovered a dozen malware-laden apps in the Google Play store. Learn about these apps and how to protect your mobile device from them. People love installing apps on their mobile devices. They have … Read More

06 Aug 2020

Preventing 3 Common Disaster Recovery Situations

Ashli LoppNews  

Do you believe in the old adage “prevention is better than cure”? Consider these prevention and recovery methods for three common disaster recovery situations. The success of your disaster recovery strategy is often judged based … Read More