The Latest in IT Security

1

When used in synergy, two recently discovered Windows flaws allow threat actors to run malware on a target endpoint(opens in new tab), researchers have found. The two flaws are a Windows Search zero-day, and a Microsoft Office OLEObject flaw. Through the use of a weaponized Word document, the Search zero-day can be used to automatically […]

Read more ...

1

The U.S. intelligence community says that Russian-sponsored actors have been targeting defense contractors for at least the past two years and in some cases have gained access to sensitive information. In an alert released Wednesday, the FBI, National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) said they had observed “regular targeting” of […]

Read more ...

1

Zero Trust is a term frequently touted but rarely implemented authentically by cybersecurity providers. Trend Micro Incorporated (TYO: 4704; TSE: 4704) is changing that with the full release of its risk insights capability following a beta test with 3,500 enterprises. The industry’s broadest Zero Trust risk assessment solution now forms a critical component of Trend […]

Read more ...


Categories

TUESDAY, JUNE 28, 2022
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments