The Latest in IT Security

Posts Tagged ‘third party’

Ever since the Target breach in December 2013 and the resulting fallout, many companies have been paying closer attention to third-party security. After all, it was one of its HVAC contractors that was the weak link in that incident, not Target itself. And even with all the stories and conference seminars around third-party security, there’s […]

Read more ...

Third-party vendors have access to valuable, sensitive corporate and government data, yet more than one third of companies don’t believe these vendors would tell them if they had a data breach, according to a recent study from the Ponemon Institute. Although it’s common to include data privacy and security procedures in third-party contracts to ensure […]

Read more ...

A third-party keyboard application for Android that had over 50 million installs was found to collect user data and send it to a remote server, Pentest Limited researchers reveal. Dubbed “Flash Keyboard” and developed by DotC United, the application was the 11th most popular app in Google Play at the time the researchers began their […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments