The Latest in IT Security

Posts Tagged ‘digital security’

Historically traditional security technologies have not been very effective. For the better part of the last two decades, IT and security teams have been focused on defending the networks. Attackers have figured out how to work around network controls. Every five to 10 years a new technology comes along that needs to be tested, and according […]

Read more ...

#attribution is the hottest word in #digital security. The term refers to identifying responsibility for an incident. What does it matter, though? Here are five reasons, derived from the five levels of strategic thought. I’ve covered those before, namely in The Limits of Tool- and Tactics-Centric Thinking. Note that the reasons I outline here are not […]

Read more ...


Categories

SUNDAY, APRIL 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments