The Latest in IT Security

1

Simply put, a cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Cyber attacks can be broken down into two broad types: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to […]

Read more ...

1

IT security may, at times, seem an elusive goal. CISOs are facing multiple challenges. Digital transformation efforts, cloud and mobile implementations, and DevOps adoption have led to increasingly complex IT environments. These same trends have also expanded the attack surface. At the same time, security leaders are grappling with obstacles often outside their control — […]

Read more ...

1

The security team, instead of operating in silos, can lower overall post-breach costs if it collaborates with other teams across the organization. Cybersecurity is still a top priority for executive leadership, researchers say in Cisco’s “2020 CISO Benchmark Report.” The survey of 2,800 IT decision-makers reveals key trends and pain points as companies face issues […]

Read more ...


Categories

FRIDAY, FEBRUARY 28, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments