The Latest in IT Security

Posts Tagged ‘Featured’

A lot of hard work needs to go into effectively implementing an intelligence-driven security model. It starts with five critical factors. Many organizations want to build a threat intelligence team but don’t really know where to start, let alone answer the question, what exactly is threat intelligence? The definition has been clouded by the industry […]

Read more ...

Researchers discovered that an SSL flaw in Amazon’s Silk web browser could have been exploited by hackers to monitor users’ search engine traffic. Amazon Silk is a Chromium-based cloud-accelerated web browser developed for the company’s Kindle Fire tablets and Fire Phones. Similar to other browsers, Silk allows device owners to select which search engine they […]

Read more ...

Microsoft is launching new Microsoft Authenticator applications next month in popular mobile app stores to provide users with multi-factor authentication (MFA) functionality on the go. MFA is the new trend among high-tech companies, and Microsoft is the latest to have made its plans on the technology official, after Yahoo! last year debuted a new sign-in […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments