The Latest in IT Security

Posts Tagged ‘Access’

As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a variety of security risks that enterprises must address. Data lakes are storage repositories […]

Read more ...

Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the visibility, control, and management that organizations in the US and Europe have over external parties accessing their IT networks. It also uncovers the level of awareness organizations […]

Read more ...

There’s a new article, published jointly by The New York Times and ProPublica, about NSA’s longstanding relationship with AT&T. It’s based on the Snowden documents, and there is a bunch of new pages published. AT&T’s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013. AT&T […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments