Skip to main content
false
Leanne Mitton

Leanne Mitton is a 25-year digital agency owner of Norlink who uses content marketing and SEO to help small businesses build better, more effective blogs and get found more often online. You can connect with Leanne on LinkedIn.

Learn 5 Min Read

Open Source vs. Closed Source Software

Understand the two models for software today: open source and closed source. Deciding which works for you comes down to need and preference.
Learn 5 Min Read

CPUs vs GPUs: Comparing Compute Power

CPUs and GPUs power all of our technology. Are they the same? When do you need one or the other? Let’s sort through the differences in this article.
Learn 6 Min Read

Risk Scoring in the Digital Age

Risk scoring is one important way to proactively identify and evaluate new threats. Get the full story on how to score your organizational risk.
Learn 6 Min Read

Goodhart's Law Explained

Numbers can guide decision-making, as long as those numbers help deliver value. And that’s precisely what Goodhart’s Law is all about. Get the full story here.
Learn 4 Min Read

CVSS: The Common Vulnerability Scoring System

Common Vulnerability Scoring System (CVSS) is a framework designed to provide a consistent and objective way to assess the severity of security vulnerabilities in IT systems. Learn more in this blog post.
Learn 5 Min Read

Data Breach Defined & Ways To Prevent One in 2024

Data breaches can happen in many ways — ransomware, phishing, accidental exposure — but one thing is clear: our data is being breached all the time.
Learn 4 Min Read

SSL/TLS Web Security Certificates & Protocols

SSL has evolved into the highly advanced TLS protocol that protects all kinds of information transmitted over the web. Read the full story here.
Learn 5 Min Read

Demystifying PGP: A Beginner's Guide to Pretty Good Privacy

Discover the basics of PGP (Pretty Good Privacy) in our beginner's guide, exploring its key features for secure email and file encryption.
Learn 5 Min Read

SysAdmins: System Administrator Role, Responsibilities & Salary

System administrators (aka sysadmins) maintain the networks, servers and technology that support your entire business. Read on to understand this vital role.
Learn 7 Min Read

Technical Debt & How To Manage It

Any debt is bad debt, right? Actually, when it comes to "technical debt" that is not the case! Get all the details here in this full article to tech debt.
Learn 5 Min Read

Insider Threats in Cybersecurity

Security anything isn't limited to outsiders. People on the inside can breach your security too. Read how in this guide to insider threats.
Learn 6 Min Read

Regulatory Compliance 101: What You Need To Know

Regulatory compliance: Two words with a lot of weight for any company in operation today. Get the full story on this complex topic here.
Learn 5 Min Read

Predictive vs. Prescriptive Analytics: What’s The Difference?

Data analytics is often broken into four categories — of which predictive and prescriptive are two! Learn what these 2 types of analytics can help your business accomplish.
Learn 7 Min Read

Top 10 Cloud Certifications For 2024 & Beyond

Explore the evolution of cloud computing, its impact on businesses, and top certifications to boost your cloud computing career.
Learn 4 Min Read

Log Data 101: What It Is & Why It Matters

Unlock the log data treasure chest! Log data provides a treasure trove of valuable information, capturing every interaction, every event, and every anomaly happening within a system.
Learn 3 Min Read

AWS re:Inforce Conference

Discover the latest in cloud security & compliance, and everything you need to know from AWS re:Inforce.
Learn 3 Min Read

Amdahl’s Law: Understanding the Basics

Learn how Amdahl's Law guides system optimization in computing. Identify bottlenecks, maximize returns, and leverage parallel computing
Learn 4 Min Read

Managed Services vs. Professional Services

Managed services vs professional services: choose the right IT solution for your business needs. Understand the differences and make an informed decision.