The Latest in IT Security

Posts Tagged ‘risk management’

If your information security function is like most, it develops copious amounts of data about the business’s security that it delivers on a regular basis. And typically it never gets read. “There’s a lack of collaboration between the two parties,” says Steve Durbin, managing director of the Information Security Forum (ISF), a nonprofit association that […]

Read more ...

It's been a few months since I dipped into our Search Engine Poisoning (SEP) logs, so I've been taking a look… As I was poking around, one thing jumped out at me, which was not on my radar screen back when I did the big series on SEP: namely, attacks themed on topics often searched […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments