The Latest in IT Security

Posts Tagged ‘computing security’

In 2017, a thermometer in a fish tank at a casino hotel lobby was hacked, enabling attackers to penetrate the casino’s network and transport its “high roller” database to the cloud. In May, 2018, a denial of service attackknocked out a corporate website for four days. The attack was orchestrated through a network of internet […]

Read more ...

A lot of the developments that occurred in the computing world for the past years involved the automation of day-to-day tasks. These developments have made peoples’ lives so much easier, therefore causing the development of a dependency to them. Paralleled by the innovations, however, is their abuse, which cybercriminals employ in their malicious schemes that […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments