The Latest in IT Security

Posts Tagged ‘risks’

The Internet of Things (IoT), cloud-based service delivery, and enterprise social media all promise tremendous benefits in agility, innovation, collaboration, and marketing. Yet each carry significant new security risks. We can provide guidance on how to raise awareness and address these new threat vectors. Many companies have reaped the tremendous benefits from IoT devices, but […]

Read more ...

The good news is that we know how to solve this problem. We need to audit computers by manually examining randomly selected paper ballots and comparing the results to machine results. Audits require a voter-verified paper ballot, which the voter inspects to confirm that his or her selections have been correctly and indelibly recorded. Since […]

Read more ...

Vulnerabilities in Microsoft’s Azure cloud platform could have been exploited by attackers to gain administrator access to Red Hat Enterprise Linux (RHEL) instances and storage accounts, according to a software engineer. Azure and Amazon Web Services (AWS) rely on the Red Hat Update Infrastructure (RHUI) to manage yum repository content for RHEL instances. Red Hat […]

Read more ...


Categories

THURSDAY, MARCH 13, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments