The Latest in IT Security

Posts Tagged ‘cyber risk’

But the tests have since been administered and the debate largely settled: risk-based cybersecurity produces proven results. The data shows that risk-based vulnerability management (RBVM) programs allow companies to get measurably better results with less work. Extrapolating from there, it’s possible to make a broad case that risk-based programs are a necessary component of enterprise […]

Read more ...

If the past year has taught us anything, it’s that trusting a device simply because it originates from inside a corporate network is not a good idea. If an endpoint is unmanaged, it leaves the company vulnerable to attack. The move to widespread remote and distributed workforces highlights this challenge. Unsurprisingly, the idea of zero […]

Read more ...

QR code usage continues to rise in popularity. In fact, 57% of respondents to a new Ivanti study claim to have noticed an increase in the usage of QR codes since mid-March 2020. As the need for touchless transactions increased due to COVID-19, 83% of respondents stated that they used a QR code to make […]

Read more ...


Categories

SUNDAY, MAY 25, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments