Skip to main content
false
Muhammad Raza

Muhammad Raza is a technology writer who specializes in cybersecurity, software development and machine learning and AI.  

Learn 3 Min Read

Corporate Espionage: What You Need To Know

Cyber threats are not only anonymous. Find out why people you know, and perhaps partner with, are spying on you — and whether it’s corporate espionage.
Learn 4 Min Read

Hacking 101: Black Hat vs. White Hat vs. Gray Hat Hacking

Is hacking evil? We’ll explain how hacking is a spectrum, with some good, some bad, some ugly. But it has potential to affect 2/3 of the Earth’s population!
Learn 4 Min Read

RBAC vs. ABAC vs. ACL: Access Control Models for IAM

Access control: Role based or attribute based? Get the full story on RBAC and ABAC — and yes, even our old friend ACL — in this access control article.
Learn 3 Min Read

Ethics & Artificial Intelligence (AI)

When AI and business meet, good things can happen — but we should consider the negative side, too. Read on to see how to adopt AT ethically and sustainably.
Learn 4 Min Read

Disaster Recovery Planning: The Organizational Guide

Disaster recovery planning. No one’s favorite activity, but someone’s gotta do it. Plan easily with this step-by-step framework that covers all disaster types.
Learn 4 Min Read

Denial-of-Service Attacks: History, Techniques & Prevention

DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Learn 4 Min Read

Encryption Explained: At Rest, In Transit & End-To-End Encryption

Humans have encrypted messages for millennia. Today it’s essentially part of daily life. Understand how it works — and decide if you need end-to-end encryption.
Learn 4 Min Read

Man in the Middle Attacks Today: Techniques & Prevention

A classic cyberattack, the man in the middle attack is still around. Learn techniques and preventions and see exactly why MITMs are a bit less threatening today.
Learn 3 Min Read

Spyware in 2024

Spyware: the name says it all. But not all spyware is bad, as we explain in this article, though each spyware type certainly has real threat potential.