The Latest in IT Security

Posts Tagged ‘Ponemon’

Despite widespread concern about the security of mobile and Internet of Things applications, organizations are ill-prepared for the risks they pose, according to research conducted by the Ponemon Institute. Mobile and IoT applications are distributed, out in the wild, and easy targets for attackers. While mobile apps have been around for some time, most companies […]

Read more ...

The recent data breach at Yahoo can be an eye opener for many enterprises with respect to the devastating implication data breaches can have on an organization’s bottom line and its brand reputation. The massive Yahoo data breach pushed Verizon to ask for $1 billion discount on the original acquisition of Yahoo while the deal […]

Read more ...

Some 600 IT professionals in the United States were interviewed to figure out best practices that could help businesses reduce infrastructure risks and raise awareness of the importance of insuring their most valuable information. In the past year, “the cost of attacks against companies’ knowledge assets […] averaged more than $5 million,” with companies reporting […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments