The Latest in IT Security

1

Shadow IT can cause big problems for cybersecurity. The trouble is in the name: these connections exist in the shadows outside of IT (information technology) and security personnel’s knowledge. So, what can IT leaders do to address it in a time of growing remote workforces? What is Shadow IT? Shadow IT consists of information technology […]

Read more ...

1

Popular video-conferencing app Zoom has introduced two new security features, allowing hosts to remove unwanted participants and alerting them if meetings have been leaked online. This fresh rollout aiming to enhance the security for millions of users couldn’t be more welcome, considering the intense scrutiny surrounding the numerous vulnerabilities exposed during the platform’s rise to […]

Read more ...

1

75% of executives believe their organization scans all web applications for security vulnerabilities, while nearly 50% of security staff say they don’t, a Netsparker survey reveals. Web application security efforts are insufficient Even more concerning, over 60% of DevOps respondents indicate that new security vulnerabilities are being found faster than they can be fixed, indicating […]

Read more ...


Categories

TUESDAY, DECEMBER 01, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments