All articles
Sort by: publishing date popularity
Apple Blocks the Posting of iPhone Encryption Key on Twitter
The encryption capabilities of the Apple iPhone have faced a lot of scrutiny in the past few years.
12 / 30 / 2019 J.R. Johnivan
Forecasting Cloud Computing Trends for 2019
A glimpse at some of the cloud computing trends we can expect to see in 2019 and beyond.
03 / 08 / 2019 J.R. Johnivan
New Updates to Retrospect Backup & Recovery Add Cloud Integration
Retrospect recently added support for a plethora of new cloud service providers -- and much more.
01 / 31 / 2018 J.R. Johnivan
Do Police Need a Warrant to Access Your Car's GPS Data?
Do law enforcement officials have the right to access your car's GPS data without a search warrant?
06 / 27 / 2019 J.R. Johnivan
Next-Gen Ransomware is Taking Aim at Backup Storage Devices
Modern ransomware is growing more sophisticated than ever before - and its now targeting NAS and other backup storage devices.
12 / 31 / 2019 J.R. Johnivan
The Weak Link in End-to-End Encryption: The Sender and Recipient
What's the weakest link in end-to-end encryption? The sender and recipient.
08 / 02 / 2018 J.R. Johnivan
EU To Limit Facial Recognition Technology
Following quite a bit of controversy, the European Commission is considering tighter controls on the use of facial recognition technology.
09 / 03 / 2019 J.R. Johnivan