The Latest in IT Security

1

Distributed denial-of-service attacks targeting large Internet service providers surged in the third quarter of last year as attackers began using a stealthy new tactic to sneak DDoS traffic past detection mechanisms. An analysis of DDoS data during Q3 2018 by Nexusguard showed attackers trying to overwhelm targeted sites, and even entire ISP — aka communications […]

Read more ...

1

When the website of a very popular plug-in used in an amazingly popular Web content management system (CMS) is hacked, this makes for big security news — even if, according to the plug-in’s publisher, there’s nothing to worry about. WordPress is used as the content platform for around 75,000,000 websites. According to some observers, WordPress […]

Read more ...

1

Shadow IT, the use of technology outside the IT purview, is becoming a tacitly approved aspect of most modern enterprises. Yet, with the vast adoption of software-as-a-service and infrastructure-as-a-service (IaaS) approaches, shadow IT presents increased security challenges that can create major risk. To further complicate things, because organizations aren’t centrally controlling these solutions and tools, […]

Read more ...

Categories

MONDAY, FEBRUARY 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks