The Latest in IT Security

Posts Tagged ‘Questions’

As Yahoo continues to investigate the biggest data breach in history, pressure is mounting on the company to admit when it knew about the attack, whether there was a delay in reporting it, and also about how it implements cryptography to secure data it’s responsible for. Security company Venafi said it examined data from its […]

Read more ...

To understand any businesses’ security posture, one must first understand the eight categories of cyber-security that is impacted: security intelligence, fraud, people, data, application, infrastructure, business partners and outsourcing, and threat intelligence. These topics serve as a great starting point for important discussions surrounding an organization’s security practice, with common security questions including: 1. What […]

Read more ...


Categories

MONDAY, JULY 15, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments