The Latest in IT Security

1

The authors of a particularly persistent Android malware family called “Joker” have once again found a way to sneak their product into Google’s official Play mobile app store. The malware (aka “Bread”) is known for subscribing mobile users to premium content without their knowledge and has been floating around since at least early 2017. Google […]

Read more ...

1

As states and cities look to lifting stay-at-home orders, the increased level of employees working remotely will not disappear. That means many businesses will be moving more of their infrastructure to the cloud and having to deal with the security challenges that come from a hybrid infrastructure, experts said this week. Almost three-quarters of companies […]

Read more ...

1

When using event logs to monitor for security violations and incidents, the quality of output is determined by the quality of the input. Much of the logging being used is subpar, and there has been little industry incentive to fix it. This, in turn, is preventing true cloud security because cloud platform logs don’t contain […]

Read more ...


Categories

FRIDAY, OCTOBER 23, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments