The Latest in IT Security

1

Remember the Love Bug virus? Security veterans will remember that, nearly 20 years ago, the computer worm also known as ILOVEYOU spread like wildfire across email systems and networks because we believed it was a legitimate email from someone we knew. Security threats were in their infancy at that point, and most users weren’t yet […]

Read more ...

1

If it seems like board directors have been paying more attention to security, the governance survey confirms it: Cybersecurity threats ranked third in the list of top concerns for the next 12 months, coming in just behind change in regulatory climate and the chance of an economic slowdown. Cybersecurity isn’t the only data- or technology-related […]

Read more ...

1

No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don’t know how, or when. While the literature generally focuses on the different uses of AI by attackers and defenders ­ and the resultant arms race between the two ­ I want to talk about software vulnerabilities. All software […]

Read more ...

Categories

FRIDAY, MARCH 22, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks