The Latest in IT Security

Posts Tagged ‘Data’

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders. The effects of insider threats are simply too big to ignore. In the most recent year on record, U.S. […]

Read more ...

Cybercriminals are targeting employees who browse the Web or check their #email from point-of-sale (PoS) computers, a risky but unfortunately common practice. Researchers from #security firm FireEye recently came across a spam campaign that used rogue email messages masquerading as job inquiries. The emails had fake resumes attached that were actually Word documents with an embedded […]

Read more ...

Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your security best practices are coming along for the ride. Cybercriminals don’t take vacations. In fact, they feast on tourists and travelers, taking advantage of people when […]

Read more ...


Categories

THURSDAY, APRIL 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments