The Latest in IT Security

Machine learning methods are often presented by developers of security solutions as a silver bullet, or a magic catch-all technology that will protect users from a huge range of threats. But just how justified are these claims? Unless explanations are provided as to where and how exactly these technologies are used, these assertions appear to […]

Read more ...

Another day, another survey – this time telling us that older people are increasingly susceptible to online fraud. According to the Daily Mirror, one million (sorry, one MILLION) older people may have fallen victim to an online scam.

Read more ...

AT&T customers now have another way to fight against spam calls. This week, AT&T revealed a new service that automatically blocks robocalls and identifies other suspicious spam calls for users on a voice and data contract with a smartphone that supports HD Voice. Read More

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments