The Latest in IT Security

minus
plus

Categories

WEDNESDAY, FEBRUARY 20, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks

1

The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that […]

Read more ...

1

Why last year’s mobile defense technology is no longer enough A year ago, a conversation about the state of the art of mobile threat defense (MTD) would have included the ability to identify attacks across the various threat vectors – apps, networks, vulnerabilities – and, more importantly, the ability to proactively protect sensitive information, wherever […]

Read more ...

1

Long gone are the days of the physical perimeter, where a company’s IT infrastructure was entirely on-site. Today’s increasingly decentralized enterprises depend on a workforce that operates both at home and on mobile devices, working together with the help of cloud-based services. Yet the death of the traditional perimeter does not mean the end of […]

Read more ...