The Latest in IT Security

Posts Tagged ‘funds’

In the last few years, the attack surface has changed from defending the perimeter to protecting applications in the cloud, leaving CISOs wondering how they can best allocate funds to stay ahead of attacks.

Read more ...

To understand any businesses’ security posture, one must first understand the eight categories of cyber-security that is impacted: security intelligence, fraud, people, data, application, infrastructure, business partners and outsourcing, and threat intelligence. These topics serve as a great starting point for important discussions surrounding an organization’s security practice, with common security questions including: 1. What […]

Read more ...

The U.S. #department of commerce‘s National Institute of Standards and Technology (#nist) will award $3.6 million for three #pilot projects designed to make #online transactions more secure and privacy-enhancing for healthcare, government services, transportation and the Internet of Things. The three recipients of the National Strategy for Trusted Identities in Cyberspace (NSTIC) grants will pilot […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments