Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, Data Breach Today, InternetNews and eSecurity Planet.
26 articles written
0 comments made
How to Block a Program with Firewall in 7 Easy Steps
Learn how to block a program in Windows Firewall. This step-by-step guide shows you how to block programs from running on your system.
What is a Network-Based Firewall? Definition, Types & Benefits
Learn everything you need to know about network-based firewalls, from how they work to their types, deployment, and benefits.
How to Set Up a Firewall: 5 Steps to Firewall Configuration
Protect your computer and data from hackers and malicious software with the help of a firewall. Here's a step-by-step guide to setting up a firewall.
What Is a Sovereign Cloud? Meaning, Purpose & User Tips
Sovereign clouds help government agencies and highly regulated industries protect their data from competing entities. Here’s how they work, who needs them, and how to get started.
8 Best Network Scanning Tools & Software for 2023
Network scanning tools help identify malicious traffic on your network. Here are the top network scanning tools to help protect your business.
7 Best Firewall Solutions for Enterprises in 2023
Enterprises should not rely on generic home firewalls. Here are the best enterprise firewalls designed for advanced security, scalability, and high traffic networks.
Linux Virtual Memory: Optimizing Virtual Memory on Linux
Understand how Linux virtual memory works and optimize your system performance. Learn about the paging process, memory allocation, and more.
4 Phishing Examples: Spot and Avoid Fraudulent Attacks
Stay vigilant against phishing scams by studying these real-life phishing examples. Learn how to spot and avoid these fraudulent attacks.
Phishing Awareness Training: Employee Anti-Phishing Training
Effective phishing awareness training for your employees can help protect your business from phishing attacks. Here’s how to train your employees and keep data secure.
7 Best Firewall Software Solutions: 2023 Firewall Comparison
Protect your network with the best firewall software. Find the top-rated solutions with our expert reviews and comparisons.
How to Prevent Phishing Attacks: 8 Best Practices
Learn how to identify, prevent, and mitigate phishing attacks with these effective strategies.
8 Best Enterprise Password Management Software for 2023
Enterprise password management software helps protect your data with stronger passwords and MFA. Here are the top password solutions for business.