author:


Security

Data Tampering: The Quiet Threat


For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzlement or other financial failings. Of late, however, data tampering has been done with far more serious intent, such as redirecting shipments at …








author:


Networks

The Most Important Skill You’re Not Hiring For


Anyone who’s hired for a technical team can understand this scenario. You’re hiring for “X” positions, so of course you receive “X” times infinity applications. Just because you’re looking for the next whizbang engineer, it doesn’t mean you get to neglect your day job. …