Ed Tittel

Ed Tittel is a 30-plus year IT veteran who's worked as a developer, networking consultant, technical trainer, writer and expert witness. Perhaps best known for creating the Exam Cram series, Ed has contributed to more than 100 books on many computing topics, including titles on cybersecurity, Windows OSes and HTML. Ed writes and blogs regularly for TechTarget, Win10 Guru, TomsITPro and GoCertify. As of January 1, 2018, Ed is also a Microsoft Windows Insider MVP.

How to improve Dynamic Lock in Windows 10 Creators Update

What is cyber insurance and why you need it

What is cyber insurance and why you need it

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

Top 7 storage certifications for IT pros

Demand for capable and talented storage technicians and engineers remains high in today's workplace, so what better way to showcase your skills than with a well-respected certification in that field? Check out our top picks from...

5 costly consequences of SMB cybercrime

5 costly consequences of SMB cybercrime

Cybercrime doesn’t affect only big businesses. Hackers are increasingly targeting vulnerable, smaller organizations, too. Learn more about how SMBs are targeted and the true costs of these crimes.

Your guide to compliance in the cloud

Your guide to compliance in the cloud

You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.

6 ways to maximize your IT training budget

6 ways to maximize your IT training budget

Customized, in-house training often zeros in on topics relevant to your business. However, it comes with an equally high price tag. If your employees simply need to fill in knowledge gaps or get up to speed with a specific software...

The dangers of dark data and how to minimize your exposure

Untapped and neglected, dark data can pose security risks should it fall into the wrong hands, or range outside its owner's control.

How to choose the best vulnerability scanning tool for your business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to explain the cloud to end users

Popular culture has exposed a fundamental knowledge gap in the ordinary consumer. Even though our smartphones are set up to auto-save pics to our online accounts, we enjoy hours of streaming videos and music, and we regularly use...

Leading-edge UTM: What C-level execs need to know

A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the security bar ever higher and respond proactively to zero-day threats.

How Adobe is moving on from Flash to embrace HTML5

Adobe Flash is still widely used, but it's seen as obsolete in the face of HTML5. In response, Adobe is taking several steps to adapt and contribute to a HTML5 future without browser plugins.

How to ensure SAM and SLM compliance in mobile environments

Software asset management and software license management aren't just for on-premises assets. Find out how they can help you ensure compliance with software policies and agreements across mobile devices as well.

Load More