The Latest in IT Security

minus
plus

Categories

THURSDAY, AUGUST 22, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks

1

Researchers discovered the personal and biometrics data of more than a million people left publicly exposed on a database owned by Suprema, a biometric security company. Data includes facial recognition and fingerprint information collected by the UK metropolitan police, small local businesses and governments globally. Suprema touts biometrics software called BioStar 2 that uses facial […]

Read more ...

1

Enhancing endpoint security can be a real challenge, yet it remains a critical component of effective cyberdefenses. With a cloud-based, modern management framework for Windows 10, best-in-class digital workspaces can provide improved protection against real-time threats while requiring fewer IT and SecOps resources. Microsoft has dramatically improved the security inherent in the operating system with […]

Read more ...

1

SQLite is a small, fast and full-featured database management system contained in a C library. SQLite is widely used and it can be found by default in many mobile and desktop operating systems, including Windows 10, macOS, iOS, Android, BlackBerry 10 OS, Oracle Solaris 10, FreeBSD, and LG webOS. It’s also used by popular web […]

Read more ...