The Latest in IT Security

1

The government of Finland is responding to a cybersecurity incident disclosed in October that left up to 40,000 Finns at risk of identity theft, fraud and extortion. The widely reported cyber-attack on psychotherapy center Vastaamo last month has convinced Finnish officials to usher in new legislation to “allow citizens to change their personal identity codes […]

Read more ...

1

A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changes the attack surface of the typical enterprise in the past few years, with more suppliers and service providers touching sensitive data […]

Read more ...


Categories

TUESDAY, MARCH 02, 2021
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments