The Latest in IT Security

Posts Tagged ‘Solutions’

I know how terrible hospital record theft can be. I myself have been the victim of a data theft by hackers who stole my deceased father’s medical files, running up more than $300,000 in false charges. I am still disputing on-going bills that have been accruing for the last 15 years. This event led me […]

Read more ...

Cyberattacks against smart cars, smart homes, and other smart devices are happening today, so it is easy to jump to the conclusion that we will soon be reading about smart buildings and smart cities being attacked. I have to admit I have become somewhat desensitized to the topic of cyber-attacks against infrastructure. Maybe it’s because […]

Read more ...

Malware operators can hide the use of malicious macros to distribute malware by simply renaming the offending Office documents, Cisco researchers reveal. Microsoft switched macros off by default in 2007, and also introduced new file formats that no longer supported macros, but cyber-criminals have discovered ways of getting around that. Macro malware, a great concern […]

Read more ...

Categories

THURSDAY, JULY 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks