I'm a writer and content developer.

I write articles about Windows, IT security, certifications and the like, and develop online and on-ground courses.

  • 77
    stories
  • 55K
    words
77
stories for
15
publications
Kim Lindros's stories for
Show all
Google identity services article
businessnewsdaily.com

Are IoT Devices Putting Your Organization at Risk?

In the offices of today's small and midsize business, you might find a vast array of smart devices, such as printers, cameras, utility sensors and door locks, all of which can communicate with other devices through wireless connections. Even the staff break room is beginning to benefit from next-generation technologies, such as smart refrigerators and smart coffee makers.

Image credit: LeoWolfert/Shutterstock

False identity 100604862 primary.idge article
CIO

10 questions to ask IDaaS vendors before you buy | CIO

Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10 questions help you find a solution that delivers what you need.

Security article 014 article
searchsecurity.techtarget.com

Insider threat detection tools that sniff out dangers from within

Learn about the insider threat detection tools that can zero-in on anomalous user behavior. Malicious or accidental, the insider threat is one of the most dangerous and costly to companies.

Certificate article
businessnewsdaily.com

5 Great 'Starter' Cybersecurity Certifications

Looking for a career change in the new year? There's no better time to consider a career in cybersecurity: U.S. businesses and government agencies are spending billions of dollars each year to protect their data and assets from malicious attacks, with Forbes reporting that $170 billion will be spent worldwide by 2020.

Search security article
searchsecurity.techtarget.com

How to craft an effective DevSecOps process with your team

Switching to a DevSecOps model in software development offers many benefits, but combining security and DevOps takes knowledge, forethought and planning.

Searchnetworking article
searchnetworking.techtarget.com

Identifying the IT operations analytics product your enterprise needs

This guide to IT operations analytics tools explains how ITOA works so networking pros can determine the most important features and assess vendor offerings.

Shutterstock 161527127 w 600 mobility article
TomsITPro

Best Mobility Certifications For 2017

Mobility has taken IT by storm, forcing management to rethink everything from big-picture infrastructure design to the details of integration among wired and wireless networks. And of course, mobile certifications are following suit.

Datacenter article 020 article
TomsITPro

Best Data Center Certifications For 2017

Owing to software-defined data center technologies, many of today's data center certifications require additional skills, including virtualization and cloud computing. Other trends affecting this space include big data, the Internet of Things, network virtualization and more. Here are some of the very best options for data center certifications for 2017.

Hacking w 640 eccouncil article
TomsITPro

EC-Council Certification Guide: Overview and Career Paths

EC-Council offers some of the best-known ethical hacking and penetration testing certifications. This guide will help you get started with EC-Council's popular CEH and LPT credentials as well as other information security certs and career paths.

Shutterstock 309941807 w 755 database article
TomsITPro

Best Database Certifications For 2017

Savvy, talented and knowledgeable database professionals are always in demand. Here are some of the best certifications for DBAs, database developers and anyone else working with databases.

Shutterstock 277550411 w 755 mobileapp article
TomsITPro

Best Mobile App Development Certifications For 2017

Spending your certification dollars on a mobile app development certification could be a very smart move.

Shutterstock 6300025 w 600 forensics article
TomsITPro

Best Computer Forensics Certifications For 2017

Computer forensics is a challenging IT discipline and experienced and certified professionals are in high demand. Yet computer forensics certs remain something of a wild frontier. From two dozen available credentials, we list the five best options for 2017.

Datacenter article 020 article
searchenterprisedesktop.techtarget.com

How to extend the life of an old PC

Some employees might use old PCs that could use replacing. But if a hardware refresh isn't in your budget, there are some steps you can take to lengthen laptop and desktop lifespans.

Vulnerable 100686705 primary.idge article
CIO

12 hardware and software vulnerabilities you should address now ...

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP.

searchmobilecomputing.techtarget.com

What IT needs to know about unified endpoint management

In "Unify to Simplify: One Management Tool for All Devices" e-Handbook

IT administrators used to have separate tools to manage PCs and mobile devices. Today, there are tools that handle nearly all types of clients, although some do it better than others.