The Latest in IT Security

1

An employee who used an app to escalate privileges in a bid to download a torrent client onto a work computer. A programmer who ran code from GitHub and ransomed his own machine. An internal user who tried to troubleshoot a Linux host machine rather than going to IT – and used a local privilege […]

Read more ...

1

Google Chrome, Adobe Acrobat Reader, TeamViewer, you name it—there’s no shortage of third-party apps that IT teams need to constantly check for vulnerabilities. But to get a better picture of the problem, let’s bust out some napkin math. The average company uses about 200 applications overall. Assuming at least 75% of these have a vulnerability […]

Read more ...

1

Data Theorem has introduced the API Attack Path Visualization capabilities for the protection of APIs and the software supply chain. This latest enhancement of its API Secure solution empowers organizations with a comprehensive understanding of the attack chain, traversing all layers of an application, and extending protection to crucial underlying cloud assets including containers, storage, […]

Read more ...


Categories

WEDNESDAY, MAY 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments