The Latest in IT Security

Posts Tagged ‘comparison’

Exploit acquisition firm Zerodium is apparently trying to attract bug bounty hunters by making public the amounts of money it’s prepared to award for various vulnerabilities in popular software. The highest payout, up to $500,000, can be earned for a high quality zero-day exploit targeting Apple iOS. From September 21 through October 31, Zerodium ran […]

Read more ...

#gemalto revealed that in the first six months of this year a total of 888 data #breaches occurred, compromising 246 million records worldwide. Compared to the first half of 2014, data breaches increased by 10% while the number of compromised data records declined by 41% during the first six months of this year. This decline […]

Read more ...

Instant messaging services have become an essential part of our lives. Not only do we constantly use them to keep in touch with friends and family, but also to chat with work colleagues about business related topics. Nowadays it’s rare not to be part of a work WhatsApp group! It’s a reality that we can’t […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments