The Latest in IT Security

Posts Tagged ‘authentication’

There is no doubt that organizations are moving to the cloud — whether driven by IT or by the business. The sheer amount of business moving to cloud-based models and the advent of off-premises systems that require much less management (and fixed expense) to operate is impossible to ignore. Read More

Read more ...

Call it a physical and cyber-security #challenge. Innovators and industry experts in Boston Tuesday for the #iot Security 2015 conference brainstormed about some of the Internet of Thing’s most daunting security challenges — #authentication, patching, smart grids, and smart homes – and how to address them. Who is responsible for patching your #smart home – […]

Read more ...

Smartwatches harbor significant vulnerabilities, including insufficient authentication, lack of encryption and privacy concerns, according to HP’s security assessment. No smartwatch the company tested had two-step authentication security enabled, while some 30% were vulnerable to account harvesting, with attackers easily gaining access to their operating systems. HP’s Smartwatch Security Study evaluated 10 smartwatches available for sale. […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments