The Latest in IT Security

Posts Tagged ‘risks’

IT organizations put great focus into drawing up their outsourcing contracts, but those agreements alone do not guarantee satisfactory outcomes. Attorney Brad Peterson has seen it time and time again. “Time and money are spent on drafting the contract—often a substantial amount of money. And a tremendous amount of potential value is created in that […]

Read more ...

So far IoT progress has been slow, but the wealth of opportunities offered by the technology emboldens a multitude of industries to look into leveraging IoT. Looking at the lax IoT security, medical device connectivity is not to be taken lightly. But what if consumer health wearables could play a vital role in self-diagnosis and […]

Read more ...

If you own a stuffed animal from CloudPets, then you better change your password to the product. The toys — which can receive and send voice messages from children and parents — have been involved in a data breach dealing with more than 800,000 user accounts. The breach, which grabbed headlines on Monday, is drawing […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments