The Latest in IT Security

1

There has been a steady increase in the volume of incidents involving corporate espionage, especially matters in which an insider is the bad actor. In an era when such risks are escalating, protection of sensitive corporate information has become paramount. Here are five key strategies companies should implement to prevent and mitigate corporate espionage. Read […]

Read more ...

1

Microsoft said Iranian state hackers are using a newly developed backdoor to target organizations in the American defense industrial base. The Iranian state threat actor that Microsoft tracks as Peach Sandstorm employed a custom backdoor named FalseFont, which features several capabilities that empower backdoor operators to remotely connect to a compromised system, initiate the execution […]

Read more ...

1

An analysis conducted by the DOJ, the FBI, the DHS and the cybersecurity agency CISA found no indication that foreign government-affiliated actors compromised the integrity or security of the election, which is consistent with the statements made by officials shortly after the vote. In their declassified report, the government agencies confirmed that threat actors, including […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments