The Latest in IT Security

European officials on Tuesday gave the final stamp of approval to a long-awaited data transfer deal between the U.S. and the European Union, allowing the agreement to go into effect after more than eight months of negotiations. The so-called Privacy Shield is intended to allow thousands of companies — from social media to hospitality — to […]

Read more ...

The internet anonymity service Tor has some bad actors among its volunteer servers set to hack dark net websites. Northeastern University professor Guevara Noubir and his graduate student Amirali Sanatinia found the many of the volunteer-run servers making up the Tor network are designed to hack the anonymous sites that connect to it. Read More

Read more ...

A majority of organizations report that they lack visibility into their cloud infrastructure, file shares, user activity and mobile devices, greatly impacting data security and system uptime, according to Netwrix. The survey of 830 respondents, conducted by Netwrix in April and May 2016, was designed to identify the means organizations are using to gain visibility […]

Read more ...


Categories

THURSDAY, MARCH 13, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments