The Latest in IT Security

Posts Tagged ‘software’

When I first saw this functionality with TimeHop years ago, I was hooked. I could see what I said or shared across all of my social networks in an e-mail every day. Unfortunately, the company pivoted — but then, so did Facebook in making the flashbacks part of their native setting. As a parent of […]

Read more ...

Akamai researchers say attackers are using an old OpenSSH vulnerability to target IoT devices and launch attacks. While the Internet of Things is touted for facilitating all sorts of life-changing services, there’s been an undercurrent of anxiety among the more security conscious IT pros. Their concern: All those smart devices, oftentimes built with default passwords and otherwise […]

Read more ...

Finding a solution to the software security and hygiene problem will take more than an Underwriter’s Lab seal of approval. There’s no arguing with the fact that acquirers of software need assurances that the software they purchase is safe and stable to use.  However, I struggle with the notion that analyzing software and assigning a […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments