The Latest in IT Security

Posts Tagged ‘Security’

The flaws were discovered using a semi-automated testing tool named LTEFuzz, which generates and sends test cases to a target network and then classifies problematic behavior by monitoring device-side logs. The results were confirmed against operational LTE networks. In a whitepaper (PDF), the researchers explain that their findings were categorized into five types, namely improper […]

Read more ...

In the era of the cloud, enterprises house sensitive corporate data outside of the traditional perimeter; employees can access this from any endpoint, including mobile devices, and from any network. This presents a host of new challenges for companies looking to protect their sensitive information. On this webinar replay, Threatpost’s Tara Seals is joined by […]

Read more ...

A ransomware attack on Spokane, Washington-based Columbia Surgical Specialists on Jan. 9 resulted in unauthorized access of medical records of almost 400,000 patients, the healthcare provider said in a press release. Although the FBI and security companies advise organizations not give in to hacker demands, the company paid almost $15,000 in ransom for a decryption […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments