The Latest in IT Security

Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential to a strong security posture.” However, many organizations struggle with an overwhelming amount of threat data and lack of staff expertise, which diminish the effectiveness of their threat intelligence programs. Threat sharing remains […]

Read more ...

Less than a week after it published another round of secret documents on the CIA’s hacking arsenal, whistle-blowing site WikiLeaks is out with a new disclosure in the Vault 7 series – the Angelfire project. WikiLeaks describes Angelfire as an implant made up of five key components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the […]

Read more ...

One good thing about having a lot of Facebook friends is that you simply act as a honey pot when your friends click on malicious things. A few days ago I got a message on Facebook from a person I very rarely speak to, and I knew that something fishy was going on. After just […]

Read more ...


Categories

SUNDAY, MARCH 16, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments