The Latest in IT Security

1

If you believe the hype, blockchain will solve most of the world’s problems, from coffee growing and logistics to shipping, medicine delivery and voting. It’s also seen as a tool to improve security, maybe even kill the password. Analysts don’t expect blockchain hype to abate anytime soon: IDC predicts growth in blockchain spending across Europe […]

Read more ...

1

Another day, another data breach — thanks to misconfigured cloud-based systems. This summer’s infamous Capital One breach is the most prominent recent example. The breach resulted from a misconfigured open-source web application firewall (WAF), which the financial services company used in its operations that are hosted on Amazon Web Services (AWS). The misconfigured WAF was […]

Read more ...

1

It’s not a stretch to say that most industries and organizations today have contractors in the mix who need remote access to the company’s network. Yet the traditional virtual private network (VPN) method of enabling access for corporate contractors—as well as other third parties such as vendors, partners, and customers—has a key flaw. The VPN […]

Read more ...

Categories

WEDNESDAY, OCTOBER 23, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks