The Latest in IT Security

1

Living in the city, we learn to tread cautiously in dodgy neighborhoods, ask hard questions of fast-talking salesmen and look both ways before crossing the street. But we increasingly live online. Most of humanity is just now trying to figure out what a dodgy online neighborhood looks like, how to judge a sales pitch without […]

Read more ...

1

In the decade since the Stuxnet worm was discovered, multiple attacks that have been launched against operational technology (OT) networks including Shamoon, Havex, Wannycry, and Lockergoga. Looking back, a disturbing trend has emerged. Industrial attacks are being recycled. Consider LockerGoga, which crippled Norsk Hydro, one of the largest aluminum manufacturers in the world, in March […]

Read more ...

Cyber-risk management is more difficult at organizations today than it was two years ago. So say 73% of security professionals in a recent ESG research survey. (Note: I am an ESG employee.) Why? Survey respondents point to things like the growing attack surface, the rising number of software vulnerabilities, and the increasing technical prowess of […]

Read more ...

Categories

SUNDAY, OCTOBER 20, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks