The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

WEDNESDAY, AUGUST 12, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

1

Vladimir Voronkov told the U.N. Security Council that the upsurge in phishing sites was part of “a significant rise in cybercrime in recent months” reported by speakers at last month’s first Virtual Counterterrorism Week at the United Nations. He said the U.N. and global experts don’t yet fully understand “the impact and consequences of the […]

Read more ...

1

User risk management watches where people can’t. If you polled a random sampling of employees at various organizations, most would probably consider themselves security-minded. They would argue that they are not actively sending sensitive data to malicious recipients, clicking strange links or downloading attachments from unknown senders. This mindset is a good attribute, and should […]

Read more ...

1

Attackers don’t need to directly hack into a programmable logic controller (PLC) to wreak havoc on an industrial process: they can target its configuration files and pivot from there. Researchers over the past year have been exposing easily exploitable holes in the so-called project files that reside in industrial control system (ICS) software for PLCs. […]

Read more ...