The Latest in IT Security

1

As organizations prioritize digital transformation, they are moving services to the cloud at a rapid clip. Yet when making this shift, many companies fail to make the necessary updates to their security programs and solutions to protect the new cloud perimeter. Rather than redesigning their security infrastructure for the cloud, many organizations are simply wrapping […]

Read more ...

1

Staying vigilant through each phase of a mergers and acquisitions (M&A) process can help businesses overcome cloud threats. Threat actors have hit victims during M&As in the past, such as the data breach that affected more than 500 million customers in 2018. Such cases force businesses to look into data exposure before and after M&As, […]

Read more ...

1

In 1999, security technologist Bruce Schneier published “A Plea for Simplicity.” In the blog, he famously wrote, “You can’t secure what you don’t understand” and “the worst enemy of security is complexity.” Schneier explained that analyzing a system’s security becomes more difficult as its complexity increases. His goal was to convince the technology sector to […]

Read more ...


Categories

FRIDAY, MARCH 05, 2021
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments