CompTIA Blog

  • What is Blockchain’s Best Use?

    by Matthew Stern  | November 13, 2018
    There’s a lot we need to know and understand about blockchain to see where and how this powerful enabling technology can be practically, effectively and profitably applied.
    Full Story
  • How Cloud Computing is Revolutionizing the Way We Manage Software

    by Matthew Stern  | November 07, 2018
    Enterprises, employees and even solution providers are winning with cloud-deployed software solutions as the cloud-based model for IT matures. Understanding how can help you find your place in the cloud IT ecosystem.
    Full Story
  • How Do You Identify New Tech Customers?

    by Chris Phillips  | November 06, 2018
    CompTIA’s four industry advisory councils came together last month focused on finding the new technology buyers.
    Full Story
  • Who Owns Digital Security in Your Company?

    by Matthew Stern  | October 31, 2018
    Who is responsible for digital security in today’s cloud-enabled workplace? Once upon a time, IT was the clear answer. Now the answer is a little more complicated – the role of IT in digital security is a matter of both leadership and partnership.
    Full Story
  • Seven Takeaways from Dare Mighty Things

    by Daniel Margolis  | October 30, 2018
    Tech innovation conference Dare Mighty Things hit Chicago this week. Read on to get next steps for blockchain and humanity’s life on Mars, as well as game changers in high-speed transportation, mind-reading, transhumanism and more.
    Full Story
  • AI: Security’s White Knight or the Next Best Friend of the Cybercriminal?

    by Lisa Person  | October 26, 2018
    Will AI save us from the cyber-crimes that make the headlines almost daily or serve to assist hackers? CompTIA’s IT Security Community tackled the question.
    Full Story
  • Are Our Nation’s Oil and Gas Pipelines Safe From Cyber-attack?

    by Natalie Hope McDonald  | October 24, 2018
    The crude oil and natural gas industries are in the crosshairs of hackers in a big way. Read how companies are scrambling to avert catastrophe.
    Full Story
  • Hackers’ New Target: Small Businesses

    by Emily Matzelle  | October 23, 2018
    The popular television series Mr. Robot depicts a group of hackers up for any challenge – the bigger the better – and this is generally how Hollywood casts cyber-criminals. In reality, they’re starting to go after the little guy.
    Full Story
  • We Have Your Data: How to Combat Ransomware

    by Emily Matzelle  | October 23, 2018
    Having your data held hostage is a sickening feeling for any end-user or business owner. But if it happens to you, don’t panic. It’s time to decisively solve the problem, or, better yet, get out in front of it.
    Full Story
  • Winter Is Coming If You’re Not Ready For A Data Breach

    by Matthew Stern  | October 18, 2018
    In Game of Thrones, Eddard “Ned” Stark warns that the winter is coming; demanding constant vigilance. Businesses may think they’re doing just that regarding their cybersecurity, but a recent CompTIA study shows they might not be as safe as they believe they are.
    Full Story
First PagePrevious Page
Next PageLast Page
Page: of 192
  • What is Blockchain’s Best Use?

    by Matthew Stern | Nov 13, 2018
    There’s a lot we need to know and understand about blockchain to see where and how this powerful enabling technology can be practically, effectively and profitably applied.
    Full story