The Latest in IT Security

1

Many organizations are moving away from using the network perimeter as a trust indicator when building and enforcing access policies for apps and other IT resources. An increasing number of enterprises have started implementing authentication solutions that perform user identity verification and device security checks for every access attempt regardless of user location, and data […]

Read more ...

1

In mid-January, researcher Troy Hunt revealed that a list was floating around in the storage space of the MEGA cloud as well as in several hacking forums. Going by the name of Collection#1, it contains the largest theft of passwords organized into a list to date, comprising more than 700 million email addresses and more […]

Read more ...

1

Several new cybersecurity regulations will enter the playing field in 2018.

Read more ...

Categories

SUNDAY, JULY 21, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks