The Latest in IT Security

Posts Tagged ‘Data’

Even a small modification might be a change you don’t like, such as a shift from “we won’t share your data with anyone else” to “now we’ve been acquired, we will allow our new parent company to use some of your personal data for other businesses in the group.” And it is difficult to compare […]

Read more ...

The Office of Personnel Management (OPM) data breach shows us how espionage is done in the digital world. It’s not only about the theft of information; it’s also about the potential manipulation of personal data. Records can be changed to make a federal employee appear less trustworthy or possibly destroyed to make a person disappear, […]

Read more ...

As mobile devices increasingly become the target of security threats, some organizations are applying cyber security tools specifically for threat intelligence. This provides real-time data feeds about potential threats and malicious attackers present online. Security decisions can then be made on the risks seen in the threat feed. Read on to hear experts ring in […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments