The Latest in IT Security

Posts Tagged ‘Challenges’

Recently I had the opportunity to attend the Changellenge Cup Russia 2015 student project competition. I was on the panel of judges for one of the sections. But today we will not speak of the contest itself, but of some of the problems we discussed at the engineering section. The participants had to elaborate use […]

Read more ...

We have previously released a number of browser security extensions to protect users against new threats and security issues, which we did not feel were addressed by anything previously available. Now I’ve focused my attention on a popular and useful security extension which has been missing on Internet Explorer. Internet Explorer is still the most popular […]

Read more ...

The internet is full of infected hosts. Let’s just make a conservative guesstimate that there are more than 40 million infected victim hosts and malware serving “hosts” connected to the internet at any one time, including both traditional computing devices, network devices and smartphones. That’s a lot of resources churning out cybercrime, viruses, worms, exploits, […]

Read more ...

Categories

THURSDAY, OCTOBER 18, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks