The Latest in IT Security

Posts Tagged ‘Technology’

Tens of thousands of devices running Cisco’s Adaptive Security Appliance (ASA) software are still vulnerable to attacks leveraging an exploit leaked by a group calling itself Shadow Brokers. Shadow Brokers has leaked hundreds of megabytes of firewall exploits and implants allegedly stolen from the NSA-linked threat actor known as the Equation Group. The leak included […]

Read more ...

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. The odds are stacked against us. Mobile operators like Verizon and Sprint routinely scan for threats, and both Google Android and the Apple iPhone include multiple security measures […]

Read more ...

Google has signed up for the EU/U.S. Privacy Shield, which provides a set of enforceable protections for the personal data of EU individuals. As described by the U.S. Department of Commerce, Privacy Shield “was designed by the U.S. Department of Commerce and European Commission to provide companies on both sides of the Atlantic with a […]

Read more ...


Categories

TUESDAY, APRIL 22, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments