Blog

Welcome to Our Blog

The Legends of Tech blog provides information on a broad range of subjects including cyber security, cloud technology, networking, coding and more.


What are the Security Risks of Cloud Computing?

Cloud computing has long been considered a benefit in the business sector. With the cloud, a team can streamline their workloads and collaborate more easily, and the cloud leads to significant space and cost savings. It should be no surprise that around 90% of businesses plan to expand their cloud usage in the coming years, especially now that COVID-19 has ushered in a new era of remote work. However, it is important to remember…

Keep reading

How to Learn Networking

If you’ve ever sent an email, made a phone call with VoIP (Voice over IP) technology, or even surfed the internet, you have done a little computer networking. This process plays an integral role in our everyday lives — especially as our lives, our jobs, and our devices become more connected. Networking allows our computing devices (computers, smartphones, tablets, etc.) to communicate with one another to share information. It also allows our devices to…

Keep reading

How to Learn Data Science

The term “data science” was coined at the start of the 21st century, but it describes a field of study that’s been around for many decades. In fact, one of the earliest known references to the field of data science was back in 1962, well before computers were commonplace in people’s homes! With data science, you can find meaningful insights from large collections of data, which can, in turn, help you (or in many…

Keep reading

What is Computer Coding?

When most people hear the term “computer coding,” they envision a scene out of the Matrix: some cool, edgy computer whiz seated at their computer and furiously typing, presumably while neon green ones and zeros flow down the walls around them. But believe it or not, coding has much older origins than you might think. Computer science pioneer Konrad Zuse developed the first coding language between 1942 and 1945! Of course, the infancy of…

Keep reading

SOC Analyst Types Explained: Tier 1, 2 & 3

SOC analysts are necessary for organizations to protect their sensitive data. In fact, data security is so important that often companies will hire multiple analysts to fill different roles under the SOC analyst umbrella. Analysts typically fall into one of three tiers — and here’s what you need to know about each one.

Keep reading

Loading…

Something went wrong. Please refresh the page and/or try again.


Follow My Blog

Get new content delivered directly to your inbox.