The Latest in IT Security

Posts Tagged ‘Data’

The term mobile has evolved from the device that simply made and received phone calls, to smartphones, wearables and a multitude of devices in the home. With the introduction of new mobile devices in every facet of our lives, we have increased our understanding of the environment around us but also within us. A conversation […]

Read more ...

More than 95 percent of #sap systems deployed in enterprises are exposed to #vulnerabilities that could lead to a full compromise of business #data, a #security firm claims. Onapsis, a Boston-based company that specializes in SAP security audits, also found that the average time-to-patch for SAP vulnerabilities is more than 18 months—12 months for SAP […]

Read more ...

As more information is disclosed from the #sony hack, it demonstrates that awareness concerns go well beyond #phishing. The now infamous Sony hack was the culmination of a variety of technical and non-technical vulnerabilities. While the attention tends to focus on the fact North Korea was the attacker, and that is important, from a practitioner’s perspective, […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments