The Latest in IT Security

Posts Tagged ‘Data’

#ibm announced at RSA Conference 2015 it is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available to clients through a cloud-based Software as a Service (SaaS) model with optional IBM Security Managed […]

Read more ...

Hackers probably gained access to Sony’s network last year after a series of #phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a #security expert said today. Last fall, Sony Pictures Entertainment, a U.S. subsidiary of Sony, was infiltrated by attackers, who purloined gigabytes worth of […]

Read more ...

85,000 new malicious IPs are launched every day, and the top #phishing targets are technology companies and financial institutions, the new Webroot 2015 Threat Brief reveals. Presented at RSA Conference 2015, this year’s report provides the latest cyber threat trends collected from tens of millions of users and over 30 security technology partners and shows how […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments