The Latest in IT Security

Posts Tagged ‘mobile’

Security researcher Slawomir Grzonkowski is warning of a simple – yet clever – spear-phishing scam that is targeting Gmail, Yahoo and Hotmail users in an effort to trick them into letting an attacker take over their accounts. The attack method leverages the availability of password recovery features offered by most email providers that allow a […]

Read more ...

Bitglass surveyed 500 IT and #security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months. As more #data leaves the network via #cloud apps and #mobile devices, the inability to protect these environments is cited as a top reason for the growth of insider threats. More specifically, […]

Read more ...

Most companies operate with a traditional perimeter security model, where the firewall guards a border. In a conventional setup, “inside the firewall” often means “safe.” The firewall protects the internal network from external access. You type a username and password into your device to authenticate and connect to a server on the network. That’s a […]

Read more ...


Categories

TUESDAY, MARCH 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments