Petronella Blog Archive

Visit our New Blog

Blog Post

Sixth Largest Data Breach in History Reported

If the initial data from LeakedSource is accurate, then the sixth largest data breach in history, with 45 million records from over 1,110 websites, has just been reported. The hackers stole such personal information as IP and email addresses, usernames, and passwords.

Read More

Tags: Hack, Password

Blog Post

Homeland Security Warning About QuickTime

Not long after researchers discovered two critical security flaws in Apple’s QuickTime the Department of Homeland Security put out a warning to Windows users still running it.

Read More

Tags: Apple, Homeland Security, Windows

Blog Post

Microsoft Underwater

No, the most well-known tech company in the world is not struggling or in trouble. Microsoft recent went underwater, literally, to see how cloud computing fares under the sea.

Read More

Tags: Cloud Computing, Microsoft, Datacenter

Blog Post

8 Benefits of Cloud Computing

Surely by now you've heard about the cloud. You might not even know exactly what it is, but chances are you've probably used it. Here are ten benefits of using cloud computing.

Read More

Tags: Cloud Computing

Blog Post

Ransomware Hits the Cloud

By now you know that ransomware, malware that encrypts a victim's computer files until they pay a ransom in Bitcoins, usually a few hundred dollars, is a particularly nasty piece of programming. Now that it can infect cloud systems, it's even worse.

Read More

Tags: Cloud Computing, Ransomware, Citrix, TeslaDecoder

Blog Post

Amazon Web Services Took Down Half the Internet

Okay, not literally half the internet, but a lot big services like Netflix, IMDB, Reddit, Tinder and much more did go down when Amazon Web Services crashed yesterday.

Read More

Tags: AWS, Netflix, Amazon Web Services, IMDB, Reddit, Tinder

Blog Post

Security vs. Productivity in the Cloud

The cloud is a terrific tool for letting people work faster and smarter, but a poll by government IT workers opines that the cloud is not secure enough to meet government standards.

Read More

Tags: Cloud Computing, Cyber Security, OPM

  • Page 1 of 3
  • 1
  • 2
  • 3

We Are Certified & Partnered With The Best

Free Book