Home Liz Laurente-Ticong Bio
Image of Liz Laurente-Ticong
Liz Laurente-Ticong

Liz Laurente-Ticong is a tech specialist and multi-niche writer with a decade of experience covering software and technology topics and news. Her work has appeared in TechnologyAdvice.com as well as ghostwritten for a variety of international clients. When not writing, you can find Liz reading and watching historical and investigative documentaries. She is based in the Philippines.1

What Is AI in Networking? Using AI for Enterprise Networks
Using AI and ML in networking can improve troubleshooting, pattern recognition, and remediation. Here's how you can use it when managing your...
Top 8 Secure Access Service Edge (SASE) Providers in 2023
Explore the top SASE providers to discover which is best for your organization when establishing secure, remote connections to your...
7 Examples of Multi-Factor Authentication Use Cases for Business
Discover ways Multi-Factor Authentication is being used by businesses across the world in order to protect their company’s...
Complete Multi-Factor Authentication (MFA) Setup Guide
Protect your sensitive account information by setting up multi-factor authentication for all of your logins. Here’s how to implement MFA on the most popular enterprise...
Network Vulnerability Assessment: Definition & Checklist
Network vulnerability assessments allow security professionals to see the state of the network’s vulnerability exposure and allows them to take...
What Is Vulnerability Management? Everything You Should Know
Vulnerability management is the process of identifying, classifying, remediating, and mitigating software vulnerabilities. Learn why it’s so important, and how to implement it in your...
8 Best Vulnerability Management Solutions in 2023
Looking for a vulnerability management solution? Compare the best vulnerability management software & tools...
What Is Multifactor Authentication (MFA)? Everything to Know
Multifactor authentication adds another step to the sign-on process of an app or website to ensure only authorized users access your network. Here’s how it keeps your data...
Top 7 Network Segmentation Tools & Software for 2023
Network segmentation lets IT break their networks into more secure and manageable segments. Here are the best network segmentation tools to help you get...
How to Build and Implement a Zero Trust Network in 8 Steps
Learn how to build a zero-trust network with our step-by-step guide. Discover the best practices for secure access & data...