The Latest in IT Security

1

Cybercriminals can exploit a critical vulnerability in Broadcom chips, a hardware and software component in most of the world’s cable modems, to intercept private messages and redirect traffic, and change default DNS servers, MAC addresses of associated devices and serial numbers, according to a paper published by Danish security researchers. The vulnerability, dubbed Cable Haunt, […]

Read more ...

1

More and more, organizations are finding they do not have the levels of automation and visibility needed to prevent, detect and respond to modern threats. These threats are harder than ever to detect, and constantly evolving to take advantage of gaps in security postures that have been widened by increasingly disparate architectures. For example, traditional […]

Read more ...

1

A landmark privacy rights bill took effect Jan. 1, 2020 in California and will have broad implications for U.S. consumers and businesses. The California Consumer Privacy Act (CCPA) mandates strict requirements for companies to notify users about how their user data will be used and monetized along with giving them straightforward tools for opting out. […]

Read more ...


Categories

MONDAY, JANUARY 27, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments