The Latest in IT Security

Posts Tagged ‘privacy protection’

Clients regularly ask IBM’s X-Force Incident Response team to scan their networks for intrusions, malicious activities or other risk factors. One such risk factor that we look for is the use of weak passwords. As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.

Read more ...

Google Duo is a simple 1-to-1 video calling app available for Android and iOS. In order to use Google Duo all you need is your phone number, no separate account is necessary. All Duo calls are end-to-end encrypted, and naturally, the video resolution quality will depend on the speed of your connection. Duo can switch […]

Read more ...

Hotels are digitally dangerous places these days. And that’s not idle speculation. Security researchers have been sounding the alarm on sophisticated attacks directed at hotel users for years. Most of the earliest reports pointed to surgical strikes on high-profile executives or representatives of government agencies, but they could prove to be precursors for more wide-ranging […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments