The Latest in IT Security

Posts Tagged ‘considerations’

Cryptography and ransom have roots deep in human history. However, only in the past few decades has the world seen what can happen when someone combines them. It started in 1989, when Dr. Joseph L. Popp kicked off the pandemic we know today as ransomware. Read More

Read more ...

Part of the reason for Donald Trump’s triumph in the US election was that, as he would say, his cyber was the strongest. In the first social media election, Trump rallied a world’s worth of hackers and extreme digital natives to his side. If he can keep that anarchic crowd on board, he’ll not only […]

Read more ...

When it comes to Internet of Things (IoT) devices, everything from smart glasses to connected cars is susceptible to malware infection if not properly secured, Fortinet senior researcher Axelle Apvrille said in a presentation at the DefCamp 2016 security conference in Bucharest, Romania this week. CCTV cameras, DVRs and network routers have made headlines recently […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments