The Latest in IT Security

Posts Tagged ‘Information’

On-server storage and processing of biometric authentication presents a host of regulatory and corporate responsibility issues. It’s bad enough when an organization exposes huge repositories of customer records and login information through large-scale data breaches. But the ante for pain is going up if organizations start collecting and storing biometric information indiscriminately. When mega breaches […]

Read more ...

Two of the most prestigious law firms in the US who are best known for their financial services and corporate practices have had their computer networks compromised by hackers. According to the WSJ, the FBI is investigation breaches at Cravath Swaine & Moore LLP, and Weil Gotshal & Manges LLP, trying to ascertain whether the […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments