
John Meah
Freelance Writer at Freelance
None at Techopedia
Author | Writer | Cybersecurity Consultant | Creative Thinker | Deadline-Oriented
Articles
-
1 week ago |
techopedia.com | John Meah
Epic Games’ David vs. Goliath legal takedown of Apple last month had rank & file gamers in celebration mode. But there’s more at stake than getting Fortnite back on iPhones. The ruling means Apple can’t compel game publishers to use its proprietary payment systems anymore. Billions of dollars will shift out of App Store income and flow back to developers. Just as the iOS owner looks to be getting serious about gaming, it faces a massive reallocation of value from mobile platforms to publishers.
-
1 week ago |
techopedia.com | John Meah
In the first five months of 2025, supply chain attacks impacted 22 out of 24 industry sectors. With everything and everyone more connected than ever, your organization’s resilience relies entirely on maintaining the best possible security defenses. Even with up-to-date policies and procedures followed by employees and third-party vendors, insider threats or human errors in manual processes can still expose your network to vulnerabilities. Take the Marks & Spencer cyberattack.
-
1 month ago |
techopedia.com | John Meah
Attack surface management (ASM) is shifting gears, from reactive fixes to real-time visibility across sprawling infrastructures. Think of continuous scanning, asset discovery, and threat prioritization; that’s what you get with attack surface management tools. Threats evolve fast. Ransomware-as-a-service kits are cheap and easy to deploy. Shadow IT pops up without warning. Supply chain attacks often target trusted vendors first, and then move on to you.
-
1 month ago |
techopedia.com | John Meah
The European Union Agency for Cybersecurity (ENISA) became one of 453 CVE Numbering Authorities in January 2024 and launched the European Union Vulnerability Database (EUVD) as a beta product in April 2025 under the NIS2 Directive. The launch represents a major leap in Europe’s push for cybersecurity independence. The EUVD addresses growing concerns about excessive reliance on infrastructure systems outside the EU, such as MITRE’s Common Vulnerabilities and Exposures (CVE) program.
-
Feb 14, 2025 |
techopedia.com | John Meah
Today is Valentine’s Day, a time for love, flowers, and chocolates. Sadly, it’s also a money-making opportunity for fraudsters looking to scam unsuspecting victims. Romance scams and other fraudulent schemes surge around at this time of year, leaving victims emotionally and financially devastated. Techopedia explores the scope of the problem and offers strategies to combat these scams.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 133
- Tweets
- 1K
- DMs Open
- Yes