Skip to content
Topia Technology
  • SECRATA
  • DATASHYFT
  • RESOURCES
  • PATENTS
  • ABOUT US
  • CONTACT

Data breach could affect thousands in Vt.

Up to 180,000 Vermont accounts on a state vendor's job search website may have been compromised in a data breach, Gov. Phil Scott announced Thursday, making the breach much larger…
Read More

Zscaler reveals risk of SSL based threats, warns of new security priority

A Zscaler research report has shown that 54 percent of threats blocked in its internet security cloud are hidden in SSL traffic, with 600,000 malicious activities per day using SSL.…
Read More

The Network Is Critical To Protect Your Business Assets

Protecting your business assets — data, devices, programs, infrastructure, and people — requires a 24/7 approach that blends protection, detection, and resolution capabilities. The latter two are critical, because it’s…
Read More

Cerocke: Is it time to collocate your IT infrastructure?

Most of the businesses that we work with have some of their IT solutions hosted or delivered remotely from cloud providers. What remains on site are usually servers that provide…
Read More

Data Analytics: The Key To Unlocking The Retail Advantage

Today’s retailers have so much to know about customers — who they are, what they buy, when they buy, how they like to pay, and how they feel about the…
Read More

Risky business: Personal file-sharing apps use at work

The unauthorised use of personal file-sharing apps at work is a growing problem that can no longer be swept under the rug and ignored. On one hand these services, such…
Read More

SXSW 2017: A look at the complex cyber security chess game

AUSTIN – Information security has never been more front and center than it is now. The recent hacking of the Democratic National Committee; the implications that Russia — a sovereign…
Read More

Why Network Visibility is Crucial to 5G Success

In a recent Heavy Reading survey of more than 90 mobile network operators, network performance was cited as a key factor for ensuring a positive customer experience, on a relatively…
Read More

Virtual environments blurring the edges for network managers

Virtual environments could be creating real headaches for network managers, with network edges in many organisations being stretched and distorted due to increased virtualisation, cloud migration, the Internet of Things…
Read More

HPA Tech Retreat: Security Risks in Online Digital Media Workflow

This HPA Tech Retreat devoted three sessions to an issue that’s grown in importance over the last few years: cybersecurity. The digitization of workflow, media, distribution and even projection has…
Read More

Posts pagination

Previous page 1 … 11 12 13 14 15 … 27 Next page
Recent Posts
  • MOVEit, the biggest hack of the year, by the numbers | TechCrunch
Recent Comments
    Archives
    • September 2023
    Categories
    • Uncategorized
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    info@topiatechnology.com | 253.572.9712
    Copyright ©2025 Topia Technology | Privacy Policy

    Topia Technology
    Scroll to Top