Home Liz Laurente-Ticong Bio
Image of Liz Laurente-Ticong
Liz Laurente-Ticong

Liz Laurente-Ticong is a tech specialist and multi-niche writer with a decade of experience covering software and technology topics and news. Her work has appeared in TechnologyAdvice.com as well as ghostwritten for a variety of international clients. When not writing, you can find Liz reading and watching historical and investigative documentaries. She is based in the Philippines.1

How to Create a Patch Management Policy: Complete Guide
Patch management policies are established guidelines across a security team to efficiently and effectively apply patches. Learn how to create your policy...
What Is Patch Management? Everything You Need to Know
Patch management involves identifying, testing, and applying patches to network hardware, software, and applications to improve security and...
What Is a Local Area Network (LAN)? Definition, Benefits & Types
Local area networks (LAN) are used to connect devices such as computers, servers, and printers within a limited geographic area. Here’s how they...
8 Best Patch Management Software Solutions for 2023
Patch management software is essential to maintaining network security and keeping your business running smoothly. Here are the top patch management...
What Is Network Vulnerability Scanning? Complete Guide
Network vulnerability scanning allows security teams to identify weak points in networks before they are exploited by attackers. Here’s how it...
6 Best Network Vulnerability Scanning Tools for Security Teams in 2023
Compare the top network vulnerability scanning tools to ensure there are no major exploit opportunities on your...
Encryption Types, Methods, and Use Cases Explained
Symmetric and asymmetric encryption are the main encryption types. Learn what each of them mean and discover examples of how they’re used...
7 Best Encryption Software for Data Protection in 2023
Compare to encryption software solutions to secure your data by transforming it into code that only authorized users can...
9 Network Segmentation Best Practices to Improve Security
Ensure you’re following the best practices for network segmentation and maximizing your security profile using this quick...
What Is SASE in Network Security? Definition and Core Functions
SASE is a single, scalable, and identity-centric service to secure and optimize remote access to applications and resources. Here’s everything you need to...