The Latest in IT Security

Universities can make juicy targets for attackers of all stripes: state-tied advanced persistent threat (APT) groups that want intellectual property (IP), criminals that want money, even the students themselves who might be looking to cause trouble. They all pose a potential threat. Last year 76 universities located across the world were attacked by hackers reportedly […]

Read more ...

With businesses continuing their digital migrations to cloud services and applications, IT is finding itself wrestling with how to keep companies’ data safe. The challenge? The cloud has created a next-generation, virtual perimeter. Businesses are using infrastructure-as-a-service (IaaS), cloud storage, software-as-a-service (SaaS) applications housed by third parties, and are connecting to these resources using mobile […]

Read more ...

The cloud-based infrastructures that enterprise organizations are increasingly using to run their business applications have become a major target for illicit cryptomining operations. According to new research from AT&T Cybersecurity, cryptomining has become the primary reason for most cloud infrastructure attacks these days. There’s no sign the attacks will let up soon, either, despite the […]

Read more ...

Categories

MONDAY, OCTOBER 14, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks