The Latest in IT Security

Posts Tagged ‘digital security’

Digital transformation projects are all about providing a frictionless and convenient user experience, reducing operational costs, delivering enriched application capabilities while enforcing data privacy and protection standards. The latter, as we know, is easier said than done. Especially since one of the cornerstone technologies of virtually every digital transformation initiative is mobility, namely anywhere, anytime […]

Read more ...

Historically traditional security technologies have not been very effective. For the better part of the last two decades, IT and security teams have been focused on defending the networks. Attackers have figured out how to work around network controls. Every five to 10 years a new technology comes along that needs to be tested, and according […]

Read more ...

#attribution is the hottest word in #digital security. The term refers to identifying responsibility for an incident. What does it matter, though? Here are five reasons, derived from the five levels of strategic thought. I’ve covered those before, namely in The Limits of Tool- and Tactics-Centric Thinking. Note that the reasons I outline here are not […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments