The Latest in IT Security

1

The balance between employee health and privacy rights is difficult to strike, especially at a time when organizations are making critical decisions based on health-related information. Collecting and sharing information is necessary but must be done with employees’ privacy in mind. Many businesses are curious to know what they can ask employees without violating any […]

Read more ...

1

Mozilla is turning on DNS over HTTPS by default for users in the United States and is making it available for users throughout the rest of the world if they choose it. The goal is to make it more difficult for Internet service providers (ISP) and other interested third parties to know what websites people […]

Read more ...

1

Simply put, a cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Cyber attacks can be broken down into two broad types: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to […]

Read more ...


Categories

MONDAY, APRIL 06, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments