The Latest in IT Security

Posts Tagged ‘[topix]’

Only half of the model-actress and pitcher Justin Verlander’s private photos are removed from indexes as the search engine grapples with legal theories over “selfies,” copyright and fair use When hackers grabbed naked photos of Jennifer Lawrence , Kate Upton and other celebrities this summer, Apple faced harsh criticism for allowing its iCloud security protocol […]

Read more ...

According to Steve McConnell, author of “Code Complete”, software development projects that reach 512,000 lines of code or more can see four to 100 coding errors per thousand lines of code. Coding errors create the software vulnerabilities that criminal hackers attack in order to enter and pillage the enterprise.

Read more ...

Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today’s hackers are after much more that credit card numbers, though — and most firms are powerless to stop them.

Read more ...


Categories

WEDNESDAY, MAY 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments