The Latest in IT Security

Posts Tagged ‘software’

Software applications access many of the most important assets organizations manage, such as intellectual property, strategic plans and customer data. This makes them a very lucrative target for cyber-criminals. Unfortunately, applications are often the weakest link in the enterprise IT security chain. Recent IBM X-Force Threat Intelligence reports have shown that many disclosed security incidents […]

Read more ...

America’s Thrift Stores reported a #breach that compromised #credit card information for an unknown number of its customers who shopped at the 18-store chain in September 2015. CEO Kenneth Sobaski said in an online statement that a breach occurred through the #software of an unnamed third-party vendor that was infected with #malware, thus giving actors […]

Read more ...

For the past six years, #volkswagen has been cheating on the emissions testing for its diesel cars. The cars’ computers were able to detect when they were being tested, and temporarily alter how their engines worked so they looked much cleaner than they actually were. When they weren’t being tested, they belched out 40 times […]

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments