The Latest in IT Security

Posts Tagged ‘cyber crime’

A recent cyberattack on a well-known tech company shows that even when the toughest anti-phishing policies are in place, 70% of companies that attempt email authentication leave the final configuration incomplete. The result is that many CIOs may leave their companies even more vulnerable to phishing attacks without knowing it. Here’s how to solve the problem.

Read more ...

NSA contractor Reality Leigh Winner was charged Saturday with leaking classified documents to The Intercept detailing Russian cyberattacks against electronic voting equipment and more than 100 election officials. The printer she allegedly used to ferret out the documents gave her away to the FBI.

Read more ...

The recent WannaCry ransomware attack is more proof that it’s just not possible for any organization, regardless of size, to entirely prevent professional cybercriminals from breaching their data networks. There will always be someone out there with the skills and motive to figure out how to penetrate even the most expensive, most comprehensive, most state-of-the-art cybersecurity system.

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments