BlueHat Seattle 2019 Call for Papers is Now Open!

Posted on Tuesday September 03, 2019

2019 has seen a phenomenal BlueHatIL in February followed by a wildly successful BlueHat Shanghai in May. Now it's time to come back home for BlueHat Seattle! 2 days of hands-on technical training (October 22-23, 2019), 2 days of conference talks from industry-leading security researchers and cyber defenders (October 24-25, 2019), great creative spaces ready...

 

How to deal with Android bloatware

Posted on Monday September 02, 2019

When you buy an Android mobile phone, the mobile carrier often installs certain apps onto the device. These apps, commonly referred to as bloatware, are usually tied into a service that the carrier offers. A majority of users, however, don't want these apps. Here's how you can deal with Android bloatware.

 

Scalable infrastructure for investigations and incident response

Posted on Friday August 30, 2019

Traditional computer forensics and cyber investigations are as relevant in the cloud as they are in on-premise environments, but the methods in which to access and perform such investigations differ. This post will describe some of the challenges of bringing on-premises forensics techniques to the cloud and show one solution to overcome these challenges, using...

 

4 Common misconceptions about virtualization

Posted on Friday August 30, 2019

Small businesses can accomplish a lot by implementing virtualization in their office IT network. Unfortunately, many SMBs shy away from it because of various misconceptions. Here are four myths about virtualization you should stop believing.

 

Why Google now prioritizes mobile searches

Posted on Thursday August 29, 2019

Google recently made changes to its search tools to prioritize mobile searches over web searches. Why has Google done this and what does this mean for businesses and users? Get the answers by reading on.

 

How to make the most out of your Time Machine

Posted on Wednesday August 28, 2019

If you're a Mac user, you probably know that macOS has a built-in feature called Time Machine. This backup application is used to keep an up-to-date copy of all the files on your Mac. What's unique about it is that it captures exactly what was on your Mac any day in the past, making it easy to recover files, emails, or media that may have been inadvertently deleted. Here's how you can make the most out of your Time Machine.

 

Page:   1...233234235236237238239240241...424

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016