The Latest in IT Security

Posts Tagged ‘cyber crime’

The name “John Boyd” and the term “OODA Loop” are probably familiar to many of the readers of this blog. I’ve mentioned one or the other in 2006, 2007, 2009 (twice), and 2014. Boyd was a fighter pilot in the Korean war and revolutionized thinking on topics like fighter design and military strategy. His OODA […]

Read more ...

Distributed denial-of-service attacks have increased in complexity so that they are no longer just an annoyance causing a disruption in service. Criminals are using these attacks as a distraction while targeting sensitive data, leaving enterprises to pay for lost business and breach recovery. Any conversation that involved breaches this year included the statement, “It’s not […]

Read more ...

The adoption of big data analytics is rapidly growing. If you don’t get ahead of the curve, there’s big potential for big problems; but if you do plan ahead, there are big opportunities to successfully enable the business. You might be wondering what the big deal is — and what makes big data special and […]

Read more ...


Categories

FRIDAY, MARCH 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments