The Latest in IT Security

The need for global secure voice and video communication is constantly growing. Whether it’s for corporate intellectual property (IP) being shared between dispersed research centers or legal offices discussing mergers and acquisitions, both content and metadata needs to be protected from surveillance.

Read more ...

Security vendor Zscaler has issued an alert on what it describes as a sophisticated new keylogger that is designed to capture every single keystroke and conduct extensive surveillance on an infected computer. Dubbed iSpy, the keylogger is equipped to steal passwords, capture screenshots, and monitor clipboards and webcams on victim systems, Zscaler said in an […]

Read more ...

If you want to detect malware or other potential risks across your enterprise, one time-honored method is to look at your endpoint behavior. A recent Simility blog post detailed how it is tracking online fraud. With the help of a SaaS-based machine learning tool, the company and its beta customers have seen a 50 to […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments