The Latest in IT Security

1

Data breaches are so common that even a theft of a billion records of seriously confidential information barely makes the news. It’s business as usual. Part of the problem is that all the data breaches involving our data become melded together. It seems as if all our personal data is already out there — many […]

Read more ...

1

CISA says it has tested BlueKeep on a machine running Windows 2000 and achieved remote code execution. The agency has advised users and administrators to install available patches, upgrade their operating system, disable unnecessary services, enable Network Level Authentication (NLA) if available, and block TCP port 3389 at the perimeter firewall. CISA’s alert comes less […]

Read more ...

1

Available as version 60.7.1, the latest Thunderbird iteration addresses only four vulnerabilities. Of these, three were rated High severity and one Low risk. An attacker capable of exploiting the most severe of these vulnerabilities could execute arbitrary code on the vulnerable machine, the Multi-State Information Sharing and Analysis Center (MS-ISAC), a division of the Center […]

Read more ...

Categories

SUNDAY, JULY 21, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks