John P. Mello Jr.

Contributor

John Mello writes on technology and cyber security for a number of online publications and is former managing editor of the Boston Business Journal and Boston Phoenix. Disclosure: He also writes for Hewlett-Packad's marketing website TechBeacon.

Credit card fraud: What you need to know now

7 ways to make your Zoom meetings safer

7 ways to make your Zoom meetings safer

Learn to use the tools Zoom gives you to secure online conferences.

10 identity management metrics that matter

10 identity management metrics that matter

Monitoring these key identity and access management numbers will help you evaluate the performance of your IAM solution.

Short on security expertise? You can still choose the right solutions

Short on security expertise? You can still choose the right solutions

Small- to medium-sized businesses (SMBs) often lack the resources and knowledge to properly vet cybersecurity solutions. Avoid poor decisions with these best practices.

5 keys to protect your supply chain from cyberattacks

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important.

How MIT's Fiat Cryptography might make the web more secure

How MIT's Fiat Cryptography might make the web more secure

By automating the writing of cryptographic algorithms, Fiat Cryptography can remove errors, produce more secure code, and boost performance.

What is spyware? How it works and how to prevent it

What is spyware? How it works and how to prevent it

Spyware is a broad category of malware designed to secretly observe activity on a device and send those observations to a snooper. It is used by everyone from nation states to jealous spouses.

Hamamatsu eliminates malware with virtual appliances

Hamamatsu eliminates malware with virtual appliances

OpenDNS rescues optical sensor maker from crippling infections.

Death of antivirus software greatly exaggerated

Death of antivirus software greatly exaggerated

After years of predicted demise, AV software continues to protect.

HTTPA: New tech transforms transparency into privacy

HTTPA: New tech transforms transparency into privacy

Privacy by obscurity is dead; long live privacy by transparency

Security incidents tracked on Radar of Seattle Hospital

Security incidents tracked on Radar of Seattle Hospital

Software simplifies compliance with HIPAA rules

Hadoop's success drives efforts to make it more secure

Hadoop's success drives efforts to make it more secure

Security seen as key to enterprise acceptance

Load More