The Latest in IT Security


Living in the city, we learn to tread cautiously in dodgy neighborhoods, ask hard questions of fast-talking salesmen and look both ways before crossing the street. But we increasingly live online. Most of humanity is just now trying to figure out what a dodgy online neighborhood looks like, how to judge a sales pitch without […]

Read more ...


In the decade since the Stuxnet worm was discovered, multiple attacks that have been launched against operational technology (OT) networks including Shamoon, Havex, Wannycry, and Lockergoga. Looking back, a disturbing trend has emerged. Industrial attacks are being recycled. Consider LockerGoga, which crippled Norsk Hydro, one of the largest aluminum manufacturers in the world, in March […]

Read more ...

Cyber-risk management is more difficult at organizations today than it was two years ago. So say 73% of security professionals in a recent ESG research survey. (Note: I am an ESG employee.) Why? Survey respondents point to things like the growing attack surface, the rising number of software vulnerabilities, and the increasing technical prowess of […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks