Russell Fairweather

Russell Fairweather

Cybersecurity Consultant
Russell Fairweather is a versatile tech enthusiast whose expertise spans IT security, development, and networking. With a deep understanding of software development principles and networking protocols, Russell crafts content that offers invaluable insights and actionable advice. Trusted by professionals seeking to elevate their coding skills and reinforce network infrastructure, Russell is a resource for tech leaders navigating the ever-evolving shifts in technology.
5 File-Sharing Services for Your Organization
Editorial 5 File-Sharing Services for Your Organization

The way we work has changed. As of 2019, the number of companies allowing remote work has increased up to 66%, with 16% of them being fully remote—according to  recent research . Because this is a growing trend, one that can yield multiple benefits for companies around the world, business file sh

Why Is Mobile Threat Defense a Necessity for Enterprises?
Editorial Why Is Mobile Threat Defense a Necessity for Enterprises?

Mobile Threat Defense (MTD), Mobile Threat Management (MTM), Mobile Threat Prevention (MTP)—regardless of the exact terminology, these all lead to the same concern: securing mobile devices. The highly digital world we live in has fundamentally changed the way we work. Mobile devices are now at the c

Encrypting our digital lives. How far can we go?
Editorial Encrypting our digital lives. How far can we go?

Full-time privacy has become essential in an increasingly connected life. At the workplace or at home, we are currently generating a tremendous amount of data. Discover below a quick guide on how to encrypt your entire digital footprint and keep your data completely safe. Surfing anonymously and

Keep Your Device Safe by Mastering App Permissions
Editorial Keep Your Device Safe by Mastering App Permissions

With the cyber threats faced by mobile phone users uprising at an alarming rate, app permissions became a crucial step in securing our devices. In 2017, Kaspersky Lab detected almost 6 million malicious installation packages and more than 94.000 mobile banking Trojans. Mobile apps need permissions

5 Types of Highly Effective Hackers & How to Avoid Becoming Their Target
Editorial 5 Types of Highly Effective Hackers & How to Avoid Becoming Their Target

Are cyber-threats keeping you up at night? You are not alone, dear reader. As hackers have become more skilled, there has been a rise in the number, severity and sophistication of cyber-attacks inflicting organizations of all sizes, all around the world. According to infosecurity-magazine.com ,

Passwords & Email Accounts: a Gateway for Hackers
Editorial Passwords & Email Accounts: a Gateway for Hackers

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.” – Richard Clarke While the former National Coordinator for Security for the United States does make a valid point regarding the importance of a strong security posture, money won’t keep you

Information Security Spending Is Growing. What Businesses Need to Know
Editorial Information Security Spending Is Growing. What Businesses Need to Know

The cybersecurity market continues its steady growth, with a 7 percent increase in 2017 – $86.4 billion, and going up to $93 billion in 2018, according to Gartner’s latest forecast. But information security is just part of the larger cybersecurity market that includes: IT security, consumer sec

Would you trust network security compartmentalization?
Editorial Would you trust network security compartmentalization?

Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a different type of compartmentalization. D

Mass surveillance, the invisible cyber enemy lurking in the future
Editorial Mass surveillance, the invisible cyber enemy lurking in the future

Surveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy number one in 2017. It managed to even

Machine to machine communication needs better security
Editorial Machine to machine communication needs better security

It is not hard to decode M2M technology, even for the less experienced of us. An abbreviation for machine to machine communication, M2M involves networked devices communicating among themselves. Without any manual assistance from humans, that is. M2M and IoT While IoT is all the tech online buzz

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later