The Latest in IT Security

Posts Tagged ‘authentication’

After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently pressed keys, revealing that keyboard-based password entry is even less secure than previously thought. Computer Science Ph.D. students Tyler Kaczmarek and Ercan Ozturk from UC Irvine’s Donald Bren […]

Read more ...

Several new cybersecurity regulations will enter the playing field in 2018.

Read more ...

88.8 %t of the root domains operated by top colleges and universities in the US are putting their students, staff and other recipients at risk for phishing attacks.

Read more ...


Categories

WEDNESDAY, MAY 27, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments