Kevin McCaney




@kmccaney


active 1 year, 1 month ago



Recent Blog Posts








  • A cloud service provider provides a wide range of capabilities, including the cloud platform and infrastructure, application and storage services, and nearly unlimited scalability, along with protections for the […]








  • Phishing tactics have steadily evolved, either in response to new defensive measures from security companies, increased awareness among users or a change in attackers’ priorities.


    For example, 10 years ago, a c […]








  • Disaster response involves several stages covering preparedness, the response to an emergency, mitigation of its effects and recovery. At the center of those stages is critical information that must be backed up, […]








  • The golden rule of security is to always be prepared.


    Say you live in a medieval castle designed to protect the king’s ransom. One day, attackers appear at the gate. If you’ve prepared for this moment by bol […]








  • Like government agencies and organizations in other sectors, the Defense Department (DoD) in many ways runs on software. “Software has become one of the most important components of our nation’s weapons sys […]





  • kevin mccaney