Revised Apple Policy Rules for Apps in App Store

Revised Apple Policy Rules for Apps in App Store

Revised Apple Policy Rules for Apps in App Store Developers of apps distributed through the Apple App Store will be subject to a new set of guidelines and policies distributed this week. Some of these changes are controversial. Some of the revisions include mobile...
Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites

Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites

Anyone Can Be A Victim – Business Email Compromise Does Not Play Favorites No matter how big you are –, you can be a victim. Business email compromise can happen to anyone, and it only takes a single moment of inattention for it to work. To carry out a...
DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe

DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe

DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe Mozilla Firefox is promoting its new DNS over HTTPS (DoH) as a privacy-preserving method, but in reality, it is changing how DNS works. Its not the magical user privacy cure but marketing...
Don’t Store Data You Don’t Need

Don’t Store Data You Don’t Need

Don’t Store Data You Don’t Need Today all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...
Are you Secure — Depends on Many Things

Are you Secure — Depends on Many Things

Are you Secure — Depends on Many Things If a business owner asks a cybersecurity specialist if they are secure, it will be tough for them to give them a straight and honest answer without delving into their systems and business operations. Most companies...
You Don’t Have Much Time To Stop An Attack

You Don’t Have Much Time To Stop An Attack

You Don’t Have Much Time To Stop An Attack How much time do you have to secure your systems from a zero-day infection? Would it surprise you to learn that it is less than 72 hours? It is true. Locking down your systems from new vulnerabilities is essential. But just...