The Latest in IT Security

Posts Tagged ‘devices’

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research conducted by the Ponemon Institute. Mobile and IoT applications are distributed, out in the wild, and easy targets for attackers. While mobile apps have been around for some time, most companies […]

Read more ...

Many of us use several devices throughout the day, relying on a PC or a laptop for work, tablet for gaming and Web surfing, and, of course, a smartphone.

Read more ...

You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include PCs, smartphones, tablets, routers, Wi-Fi refrigerators, smart toys, and a lot of other gadgets. In this post we explain what a botnet is, the bad […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments