The Latest in IT Security

1

Exploit techniques for some zero-day software vulnerabilities just got even more lucrative for security researchers willing to sell them as cybersecurity intelligence firm Zerodium this week raised its payout for exploits – in some cases, doubling the awards. Zerodium doubled the bounty it pays for unknown exploits targeting popular operating systems and software programs. It […]

Read more ...

1

Despite the influx and rapid evolution of threats plaguing businesses today, many enterprises still rely on limited cyber resilience measures. Some embrace completely locked-down network perimeters. For others, robust endpoint controls on servers and workstations define the organization’s security posture. Some security leaders tout their users as the first line of defense when it comes […]

Read more ...

1

Two decades ago, AOL Instant Messenger (AIM) changed the way we communicate. It was more private than a phone conversation — which was especially great if you worked in a cubicle — and the real-time nature of the conversations was big advantage over email when you needed an immediate answer. Its convenience, at the time, […]

Read more ...

Categories

TUESDAY, MAY 21, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks