The Latest in IT Security

Posts Tagged ‘Taxonomy’

In this edition of Lab Matters, Ryan Naraine interviews Kaspersky Lab CTO Nikolay Nikolay Grebennikov about malicious threats on mobile devices. Grebennikov talks about the taxonomy of threats and explains Kaspersky Lab’s vision for protecting data on smart phones. The discussion touches on privacy issues, data protection, anti-theft recovery, social engineering, URL filtering and parental […]

Read more ...

I get a lot of press enquiries currently about hacktivism, usually in the context of certain groups who have had more than enough publicity already. While discussing some related issues with my colleagues at ESET UK, it occurred to me that what we're lacking here is a clear differentiation between types of "hacktivist" or, indeed, "activist": much […]

Read more ...

Recently published on Microsoft’s Technet Blogs site, nestling between Haiku #154 and Bloom’s Taxonomy for Learning Objectives, you will find an unassumingly erudite, if lawyerly, posting. You probably want to read it. It could be worth US$250,000. To get all the money for yourself, there are, of course, conditions. You will need to rat out […]

Read more ...


SUNDAY, APRIL 14, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments