• Contributor

Tektonika Staff

Being an Author

Are you an experienced writer with IT expertise? Contact us today to become a Tektonika contributor.



09/08/2018 | 3 Minute Read

Are you sending data to your printers securely?

Defending data from hackers, internal threats and malicious third parties has never been easy. The Internet of Things (IoT) has given cyber attackers...


26/07/2018 | 5 Minute Read

Cybersecurity taps machine learning to do what humans cannot

Researchers are rapidly advancing AI's ability to deliver the always-on, proactive watchfulness needed for today's complex threat environment. Michael...


19/07/2018 | 4 Minute Read

Prevention or recovery: Where should limited cybersecurity resourc…

As cyber attacks become more complex, a lively debate has emerged on the best defense strategies. Michael Keller, March 13, 2018 A 2013 scheme by...


12/07/2018 | 4 Minute Read

Where cyber intruders look first to find a way in

Internet-connected devices that live on a network's edge are favorite targets of hackers. Michael Keller, March 13, 2018 It was simpler times way back...

  1. 1


28/06/2018 | 5 Minute Read

Balance your IT budget with Device as a Service

Did you know the average employee uses three or more devices every day for work-related activities? According to Citrix, the number of devices managed...

  1. 1


26/06/2018 | 4 Minute Read

Is Alexa for Business smart technology or a security nightmare?

Is next-gen smart technology worth adding to your IT network? It's up to you to vet any new tech before bringing it on board. After all, you already...

  1. 1