The Latest in IT Security

1

Cryptojacking is the most common form of attack against container-based systems running in the cloud, while geopolitical motivations—mainly related to Russia’s war against Ukraine—factored into a fourfold increase in DDoS (distributed denial-of-service) attacks this year, according to a new report from cybersecurity company Sysdig. As containers are increasingly used in cloud-based systems, they have also […]

Read more ...

1

As organizations increasingly migrate their data and applications to the cloud, it’s more important than ever to understand how to protect this highly sensitive business information. Preventing leaks and data theft is critical for maintaining customer trust. And the cost of a single data breach can reach millions of dollars for many companies. While cloud […]

Read more ...

1

Referred to as #AttachMe and mentioned in Oracle’s July 2022 Critical Patch Update, the vulnerability could have exposed sensitive data to attackers knowing the victim’s Oracle Cloud Identifier (OCID). “OCI customers could have been targeted by an attacker with knowledge of #AttachMe. Any unattached storage volume, or attached storage volumes allowing multi-attachment, could have been […]

Read more ...


Categories

TUESDAY, OCTOBER 04, 2022
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments