The Latest in IT Security

1

With most people having a near-constant connection to the internet in one form or another, it’s imperative to understand the associated data privacy implications and take appropriate actions to protect sensitive information. Whether you’re using a mobile phone, tablet, laptop or desktop computer, our devices are always in communication with the internet, sometimes even without […]

Read more ...

1

Despite the influx and rapid evolution of threats plaguing businesses today, many enterprises still rely on limited cyber resilience measures. Some embrace completely locked-down network perimeters. For others, robust endpoint controls on servers and workstations define the organization’s security posture. Some security leaders tout their users as the first line of defense when it comes […]

Read more ...

1

When it comes to artificial intelligence (AI) and security, InfoSec and IT teams have raised skepticism to an art form. After all, we’ve been hearing since the late 1980s that AI is coming. Given that most vendors have slipped AI and machine learning (ML) terminology into their marketing speak, it seems like it’s much more […]

Read more ...

Categories

FRIDAY, NOVEMBER 16, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks