The Latest in IT Security

Posts Tagged ‘Analysis’

Envision B2C scenarios like online retail to customer, university to student or retail banking to account holder: Users come and go, and user management can quickly become burdensome, especially in traditional identity and access management (IAM) environments. Managing millions of customer identities is a different scale of problem than managing thousands of employee IDs.

Read more ...

The callers are polite, and they sound very earnest, explaining in great detail how hackers can loot your bank accounts, steal your identity, and compromise passwords. They are intent on convincing you the threat is not only real but hackers are already in your system performing all manner of nefarious activities. Your computer has been […]

Read more ...

Wouldn’t it be something if you managed to spear-phish the technical director of an anti-malware company? The criminal kudos would be sky-high; but just imagine the possible effect of getting top-level credentials into a cloud-based anti-malware product that automatically pushes out updates to millions of customers. Worth a try, I think. And try they do. […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments