The Latest in IT Security

1

Can you control the workstations in your network to only run the applications you want them to run? Do you know if their applications are being accessed appropriately? Are you doing everything you can to limit intrusions via illicit consent? Are you monitoring what sensitive information is in your office and should be protected? If […]

Read more ...

1

Pressure to reinstate a cyber czar within the White House is growing, with bipartisan allies lining up on Capitol Hill to push such a proposal while the incoming administration zeroes in on addressing cybersecurity challenges. Outside experts and allies say they are optimistic President-elect Joe Biden will establish a cybersecurity coordinator position in the White […]

Read more ...

1

Especially with the pandemic, organizations want their technology accessible from any location. Security vulnerabilities, however, dictate that it may not be wise to expose everything to the internet. I have seen businesses or educational institutions set up all their computers and devices with public IP addresses. It’s common to accidentally leave networks open to attackers. […]

Read more ...


Categories

TUESDAY, DECEMBER 01, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments