The Latest in IT Security

Posts Tagged ‘security practices’

The recently discovered vulnerability involving fax lines on HP multi-function devices, termed Faxploit, are a reminder of the importance of fundamental security practices. I did something a few weeks ago I rarely do: ignore a report about a significant vulnerability. Check Point Software released a very detailed analysis about the possibility of a network being […]

Read more ...

Microsoft has been criticized for its Windows 10 data collection practices, and the French National Data Protection Commission (CNIL) recently served the company a formal notice to stop collecting excessive user data. As a result, Creators Update addressed these concerns, and CNIL closed the formal notice last week.

Read more ...

All companies may have to revisit their IT spending and security practices following the Target data breach. Does anyone really believe that Target was the only company that had lax practices.

Read more ...

Categories

WEDNESDAY, NOVEMBER 14, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks