The Latest in IT Security

1

A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found. Websites’ lax creation policies for passwords The researchers used an automated account creation method to assess over 20,000 websites across the Tranco top 1M and evaluate the password creation policies users […]

Read more ...

1

Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Many organizations no longer feel it’s adequate to secure data only once it “settles” in a cloud data warehouse, and know that they must begin […]

Read more ...

1

Some of the most popular mobile password managers on Android have a serious security flaw that could cause the worst problem possible for users – leaking their credentials. Known as “Autospill,” the vulnerability involves a bug in the autofill function on Android devices. It was discovered by researchers at the International Institute of Information Technology […]

Read more ...


Categories

WEDNESDAY, MAY 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments