The Latest in IT Security

Posts Tagged ‘risk management’

Executive protection teams face threats from many sources including social media, telephone, email, and event in-person physical threats. The teams must determine which are valid threats that require action, and which are mere online rants or harassment that should be monitored, but are largely harmless. When the threat is concerning enough to cause teams to […]

Read more ...

Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all sectors, regardless of size, geographical location or type of industry. But because systems are so interconnected and third parties often hold sensitive information or have access to a partner’s systems, […]

Read more ...

The general lack of transparency around cybersecurity continues to be one of the largest factors holding back the combined ability of the public and private sector to truly defend against the impact of cyberattacks. Before we get into the details, let me start out by saying that the global community of enterprise cybersecurity practitioners and […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments