The Latest in IT Security

1

Initially, digital biometric data processing systems were used primarily by government agencies and special services (police, customs, etc.). However, the rapid evolution of information technology has made biometric systems accessible for ‘civil’ use. They are increasingly becoming part of our everyday lives, augmenting and replacing traditional authentication methods, such as those based on logins and […]

Read more ...

1

All of the cybersecurity programs that we have ever evaluated as part of this series have had one thing in common. None of them ever claimed to be completely, 100% effective in every case. And even if they somehow achieved that goal for a brief snapshot in time, hackers are always advancing their tactics and […]

Read more ...

1

Spear phishing is the number one cyber-threat to organizations in the European Union, according to the European Cybercrime Centre (EC3), a group of cybersecurity experts set up by Europol to help fight cybercrime. The finding is highlighted in the EC3’s “Spear Phishing: a Law Enforcement and Cross-Industry Perspective,” a strategic report reflecting the views of […]

Read more ...


Categories

WEDNESDAY, FEBRUARY 26, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments