Media Database
>
Peter Loshin

Peter Loshin

Senior Technology Editor at TechTarget

Contact this person
Email address
p*****@*******.comGet email address
Influence score
21
Phone
(XXX) XXX-XXXX Get mobile number
Location
United States
Languages
  • English
Covering topics
  • Technology

View more media outlets and journalists by signing up to Prowly

View latest data and reach out all from one place
Sign up for free

Recent Articles

techtarget.com

Pretty Good Privacy (PGP) - TechTarget

Pretty Good Privacy (PGP), once the most popular encryption software, is now much more. Find out how PGP’s protocols captured the email encryption market.
techtarget.com

What is the Linux operating system?

Learn all about Linux, including what goes into a Linux distribution, how Linux is used, how it works, the pros and cons of using Linux and its history.
techtarget.com

What is OWASP? What is the OWASP Top 10? All You Need to Know

The Open Web Application Security Project, or OWASP, identifies and ranks top web app security risks -- but that's not all. Discover what else OWASP does.
techtarget.com

What is a Help Desk?

A good help desk can mean the difference between a successful product and an unsuccessful one. Find out what makes a good help desk and how it works.
techtarget.com

Using SSH tunneling for good and evil

Learn about the different types of SSH tunnels, and find out how both security professionals and hackers use them to circumvent firewalls.
techtarget.com

How to use SSH tunnels to cross network boundaries

SSH tunneling enables crossing protected network boundaries and firewalls. Learn how to use three types of SSH tunnels to protect network communications.
techtarget.com

SSH2 vs. SSH1 and why SSH versions still matter

What’s the difference between SSH1 and SSH2? Learn how SSH protocol versions 1, 2 and 1.99 differ, and discover why they matter to security.
techtarget.com

Email authentication: How SPF, DKIM and DMARC work together - TechT...

Learn how SPF, DKIM and DMARC -- the top internet email authentication protocols -- work together to fight spam, phishing and email spoofing.
techtarget.com

How to create and add an SPF record for email authentication - Tech...

Find out how to create an SPF record to prevent email forgery and cut down on spam and phishing by restricting email deliveries to authenticated servers.
techtarget.com

Why it's time to expire mandatory password expiration policies

Mandatory password expiration policies are ineffective. Learn why it’s time to reexamine password policies and how to best protect passwords today.
techtarget.com

What are the most important email security protocols? - TechTarget

Email was designed without security considerations. Email security protocols, including SMPTS, SPF and S/MIME, add mechanisms to keep messaging safe from threats.