The Latest in IT Security

1

No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don’t know how, or when. While the literature generally focuses on the different uses of AI by attackers and defenders ­ and the resultant arms race between the two ­ I want to talk about software vulnerabilities. All software […]

Read more ...

1

“The prosecutor’s office in Frankfurt, the Central Office for Fighting Internet and Computer Crime and the Federal Police Office (BKA) searched the apartment of a 20-year-old suspect on January 6 and took him into custody,” the BKA said in a statement. Media reports said the suspect, who was detained in the western state of Hesse, […]

Read more ...

1

In a letter sent to impacted customers, the Memphis-based company says that the attackers were able to compromise its system in 2017 and that they installed malware that remained active at least between November 23, 2017 and October 25, 2018. The company reveals that users who purchased goods from its online stores during that time […]

Read more ...

Categories

MONDAY, FEBRUARY 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks