The Latest in IT Security

Posts Tagged ‘Recovery’

A few months ago on this blog we raised the basic points that you should think about when confronted with a cyber-attack. Unfortunately the general reaction of some companies is very different to this – here we present to you some of the worst reactions to a cyber-attack: Not reacting as quickly as expected (TRICARE) […]

Read more ...

Secret questions offer far lower #security than user-chosen passwords, and should never be used as the only way to reclaim access to a lost account, #google researchers have confirmed. After having examined a large, real-world data set on personal knowledge questions, they found that users are having trouble remembering the correct answers. One reason for this […]

Read more ...

Life today is vastly more complicated for IT managers than it used to be, thanks in large part to two key trends: bring-your-own-device computing and the growing prevalence of mixed-infrastructure IT environments. Aiming to ease some of the pressure on both ends, Citrix on Tuesday unveiled a new #cloud offering designed to give enterprises maximum […]

Read more ...


Categories

TUESDAY, APRIL 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments