The Latest in IT Security

Posts Tagged ‘Information’

The posited pattern matching capabilities of quantum computing may have a couple of different applications in access control. Biometrics would likely benefit from improved abilities to match and compare. At the moment we don’t actually compare, for example, the fingerprint originally registered with the fingerprint presented. Biometric matching must be done on the basis of […]

Read more ...

Oliver Stone’s movie about Edward Snowden, which opens on Friday, September 16th, 2016, has a lot of people looking back at one of the biggest information security breaches in US history, the one we learned about in June, 2013. That’s when the UK-based Guardian newspaper published classified information about the mass electronic surveillance activities of […]

Read more ...

Hackers are becoming a major source of political leaks in this year’s presidential race. Case in point: On Tuesday, stolen emails from former secretary of state Colin Powell became headline news after a mysterious site with possible ties to Russian cyber spies gave them to the press. Since then, media outlets have been pointing out […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments