Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection-
A
Advanced Persistent Threat (APT) – An unauthorized person gaining...
Another week of vast information consumption, headlines, breach reports, security bulletins and client concerns. Learning everyday in the security consulting business...
Four key differences between blockchains and regular databasesIf you’ve been reading my previous posts, you will know by now that blockchains are simply...