The Latest in IT Security

Posts Tagged ‘Encryption’

We are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shorteners to aid them in achieving their objectives. URL shorteners are often used by cyber criminals to obfuscate redirects to malicious destinations. Recently, a URL shortening service […]

Read more ...

When a message carrying sensitive information is intercepted, whether accidentally or maliciously, an entire corporation stands on the shaky grounds of potential downfall, from branding to the bottom line. Regardless of whether or not communicating in this form is allowed in your organization, chances are your users are doing so insouciantly.

Read more ...

Congress must enact a law that would require companies to decrypt data upon government request, Senate Intelligence Committee Chairman Richard Burr (R-N.C.) argued Thursday in a Wall Street Journal op-ed. “Criminals in the U.S. have been using this technology for years to cover their tracks,” Burr said. “The time has come for Congress and technology […]

Read more ...


Categories

TUESDAY, MARCH 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments