The Latest in IT Security

Posts Tagged ‘events’

RSA Conference 2017 will take on the threat posed by the internet of things, something that was demonstrated last fall by the DDoS attacks that took down Dyn data centers and many of the high-profile Web sites it supports. Those attacks, generating peak traffic of 1TByte or more, raise the question of how best to […]

Read more ...

Conferences can be great opportunities for networking and information sharing. While it’s a challenge to break away from the responsibilities at the office, taking a day or two to connect with peers across the industry can be invigorating and uplifting, allowing you to return with a fresh and optimistic perspective on the doldrums of threat […]

Read more ...

Turn the Cyber Kill Chain against your attacker Created by Lockheed Martin, the “Cyber Kill Chain” model has traditionally been used to describe the evolving stages of a cyber attack. However, if this model is applied to internal security processes it’s possible for an organization to identify a compromise and eliminate threats before they result […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments