Russell Fairweather

Russell Fairweather

Cybersecurity Consultant
Russell Fairweather is a versatile tech enthusiast whose expertise spans IT security, development, and networking. With a deep understanding of software development principles and networking protocols, Russell crafts content that offers invaluable insights and actionable advice. Trusted by professionals seeking to elevate their coding skills and reinforce network infrastructure, Russell is a resource for tech leaders navigating the ever-evolving shifts in technology.
Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing
Editorial Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing

A few years ago, talking about homomorphic encryption in a business context would elicit either blank stares or sighs. Those who were familiar with it recognized its paradigm-shifting potential, and others were just curious about its potential and its computational practicality. But now, the world

Are We Still Using Firewalls In 2022?
Editorial Are We Still Using Firewalls In 2022?

Designed to protect computer networks against unauthorized access, firewalls have been an enterprise battleground for many years. The firewall may be implemented as a form of hardware, software, or a combination of the two. After the “classic” firewall market became somewhat saturated, developers re

3 Reasons Why Cloud Contact Centres Are the Next Step in Customer Success
Editorial 3 Reasons Why Cloud Contact Centres Are the Next Step in Customer Success

At the same time that the implications of the global pandemic have created difficulties for many, they have also sparked an opportunity for growth and change.  One key area that has continued to evolve even as we return to a sense of normality, is customer experience. Indeed, according to Deloitte,

Creating the Perfect Password: Simple Tricks that Makes it Almost Impossible to Break
Editorial Creating the Perfect Password: Simple Tricks that Makes it Almost Impossible to Break

Creating the perfect password is not a complicated endeavor, and it is crucial for business and personal safety. Passwords like 123456, “password” and “qwerty” are common, and should be avoided. Even more complicated passwords can be easily cracked if a computer program is systematically trained to

Warning signs your identity has been stolen—and how to protect yourself against identity fraud
Editorial Warning signs your identity has been stolen—and how to protect yourself against identity fraud

According to some estimates , cybercrime is a $6 trillion annual industry, which would qualify it as the world’s third-largest economy after the U.S. and China. There is a great deal of money to be made, and cybercriminals are constantly adopting new business models to stay afloat in this i

Hackers Are Getting Smarter: How They Compromise Corporate Networks 3 Times Faster in 2021
Editorial Hackers Are Getting Smarter: How They Compromise Corporate Networks 3 Times Faster in 2021

Hackers have managed to compromise corporate networks three times faster in 2021, with 75% of attacks being financially motivated, a recent report shows. Both government and industry experts say greater complexity and interdependence among systems gives attackers more opportunities for widespread,

Is Facebook Trying to Analyze Users’ Encrypted Messages?
Editorial Is Facebook Trying to Analyze Users’ Encrypted Messages?

In its many years of being the leading app for fast and simple online chat, WhatsApp has been through a lot, including a privacy policy that has sparked some concern. The Facebook-owned platform boasts end-to-end encrypted messaging that provides users with increased security. However, a recent

The remote workforce of the future and why it’s time to update your access policy
Editorial The remote workforce of the future and why it’s time to update your access policy

Recently, major browsers have started to improve processes for users to change compromised passwords. The reality is that now more than ever, users need tools for dealing with passwords caught in data breaches. For many organizations, remote working is no longer a luxury for a handful of employees.

Top Cybersecurity Skills for 2021
Editorial Top Cybersecurity Skills for 2021

With cybercrime constantly on the rise, businesses around the world are suffering attacks that prove to be costly, leading to loss of revenue and customer trust. The fight against hackers begins with professional expertise. Cybersecurity workers must constantly reinvent their skill sets to keep the

Top Password-Cracking Techniques Used by Hackers – How Do They Work?
Editorial Top Password-Cracking Techniques Used by Hackers – How Do They Work?

While passwords are the most popular account security tool, they aren’t necessarily the safest option. Security experts agree that human beings are the weakest link of any security system. Most often, users create weak passwords, store them as plain text, and use them on multiple online accounts. A

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later