The Latest in IT Security

1

Identity Management Day was created to spread awareness and educate business leaders, IT decision makers, and the general public about the importance of managing and securing digital identities. Not only have we seen a rise in the sheer number of threats, but the complexity of such attacks is increasing at an alarming rate. As the […]

Read more ...

1

Holidays inspire fraudsters and scammers to create timely and effective ways to string people along and get them to give up either their money or their personal information. This is the case in this chocolate-themed scam. Cadbury UK has issued a warning to its 315,000 followers on Twitter about a scam making the rounds on […]

Read more ...

1

Cybercriminals have started using Static Web Apps, an Azure service, in their phishing attacks against Microsoft 365 users. Researchers from MalwareHunterTeam noted Static Web Apps have two features that are being abused with ease – custom branding for web apps, and web hosting for static content such as HTML, CSS, JavaScript, or images. These features […]

Read more ...


Categories

TUESDAY, MAY 24, 2022
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments