The Latest in IT Security

Posts Tagged ‘Solutions’

The Internet of Things (IoT), commonplace devices connected to each other to become more than the sum of their parts, is quickly becoming an exciting reality. However, there are connectivity, interoperability, management, scalability, privacy and security challenges that require a hands-on approach to this phenomenon.

Read more ...

Engaging with any IT vendor around mobile security will invariably lead to the conclusion that there are many tools available. It’s at this time that some simple qualification can determine whether the vendor has a solution that addresses your enterprise requirements. Mobile solution proliferation is driven by that fact that humans want to engage with […]

Read more ...

“Humans suck at choosing passwords,” writes security pundit Graham Cluley. That is hard to argue according to SplashData (TeamsID), which reported on 2015’s worst passwords, with 123456 and password ranking as the most commonly used passwords. “In SplashData’s fifth annual report, compiled from more than 2 million leaked passwords during the year, some new and […]

Read more ...


Categories

SUNDAY, MAY 05, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments