The Latest in IT Security

Posts Tagged ‘data access’

In today’s sophisticated IT world, relying on simple username and password authentication is no longer enough to ward off the growing volume and variety of cyber-attacks. Because multi-factor authentication (MFA) requires multiple methods for identification, it’s one of the best ways to prevent unauthorized access to corporate data. At the same time, however, MFA must […]

Read more ...

Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable. The vulnerabilities allow for so-called Masque attacks because they involve the impersonation of existing apps or their components. […]

Read more ...

Dutch users were recently targeted in a website compromise that involved a popular news site in the Netherlands, The site was compromised and modified to load a malicious iframe that resulted to visitors’ systems being infected with a SINOWAL variant. Trend Micro researcher Feike Hacquebord says that considering the different characteristics of this attack, […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments