The Latest in IT Security

Posts Tagged ‘Data’

Logjam is a new weakness in TLS that allows an attacker to downgrade the cryptography on a connection; it is similar to another recent #attack on TLS calledFREAK. To help us understand why widespread panic is unnecessary, let’s look at what a practical attack would get the attacker, and what that attack would require. An […]

Read more ...

At Infosecurity Europe 2015, the #cloud #security Alliance (CSA) #privacy Level Agreement (PLA) Working Group released the Privacy Level Agreement (PLA) v2, a tool that provides cloud customers and potential customers, of any size, with a mechanism to identify a baseline of mandatory personal data protection legal requirements across the EU. It also allows cloud […]

Read more ...

46 percent of organizations that have suffered a data breach took more than four months to detect a problem, and more than three months to mitigate the risk. Worryingly, the survey of 1,000 IT professionals, conducted by OnePoll on behalf of LogRhythm, also revealed that 70 percent of breaches were detected by a third-party, rather […]

Read more ...


Categories

WEDNESDAY, MARCH 26, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments