The Latest in IT Security

Posts Tagged ‘sampling’

Whether a Montague or a Capulet, it never mattered to Juliet, as she made the case in Shakespeare’s “Romeo and Juliet” when she says one of her most famous lines, “What’s in a name? That which we call a rose by any other name would smell as sweet.”Earlier this week, we wrote about the increase […]

Read more ...

Quite regularly, I get feedback from our customers that they’ve found malware on their computer, and don’t know how it got there. While you may think this is due to malware exploiting unpatched bugs in the Windows operating system, it isn’t: these customers are predominantly using OS X, and they usually have all the latest […]

Read more ...

03
Oct
2011

Personal information belonging to a full third of Massachusetts residents has been compromised in one way or another, according to the state’s attorney general, citing statistics gleaned from a tough new data breach reporting law. Watch a slideshow version of this story. RSA recently announced that security of its two-factor SecurID tokens could be at […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments