fbpx

What is a rootkit? And how to stop them

used with permission from Norton by Symantec by Dan Rafter   Computer viruses and other malware are real threats. And rootkits might be the most dangerous, both in the damage they can cause and the difficulty you might have in finding and removing them. Rootkits...

3 quick tips and best practices for better IIoT security

used with permission from HP Tech@Work Joe Hewitson It’s no secret by now that IIoT is a pretty powerful platform for innovation. It’s may also come as no surprise that IIoT security risks represent considerable threats to manufacturing IT. You know what’s not so...

The AI Focus on Our Planet

used with permission from HP Tech@Work Algorithms for the greener good AI is already a huge force in business – but all those hardware advances, big data, and powerful algorithms are pointless if we don’t have clean air to breathe and clean water to drink....