The Latest in IT Security

Posts Tagged ‘data protection’

Researchers at Endgame have been evaluating an exploitation technique called Counterfeit Object-Oriented Programming (COOP) to bypass Control Flow Integrity (CFI) implementations such as that used by Microsoft to harden the defenses of Windows 10.

Read more ...

Since joining Kaspersky Lab nearly two years ago, I have always seen David Jacoby as one of our company’s more outgoing and jovial researchers. In addition to creating security memes for Halloween, he also helped put a human face to the company’s GReAT team and even let a film crew look at his crib (MTV style).

Read more ...

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research.
“The security challenge for mid-tier businesses is multi-dimensional,” Daniel Cummins, analyst at 451 Research, said in a statement.

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments