The Latest in IT Security

1

Kevin Gosschalk, CEO at Arkose Labs: Start by ensuring your organization doesn’t have any easily solved vulnerabilities. This is where things like bug-bounty programs come into play because they are really good at finding the low-hanging fruit. The goal is to make it more expensive for attackers by moving the attack surface as far out […]

Read more ...

1

It sounds simple: A scanner identifies a vulnerability, the vulnerability is patched. What happens in between, however, can be far from simple. Yet if you are not on a security team or, more specifically, a vulnerability management team, you would never know the bumpy, winding road that often stretches between scanning and patching. The Patch […]

Read more ...

Enhancing endpoint security can be a real challenge, yet it remains a critical component of effective cyberdefenses. With a cloud-based, modern management framework for Windows 10, best-in-class digital workspaces can provide improved protection against real-time threats while requiring fewer IT and SecOps resources. Microsoft has dramatically improved the security inherent in the operating system with […]

Read more ...

Categories

WEDNESDAY, OCTOBER 23, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks