IT Security

Fortanix Adds Platform to Manage Confidential Computing on Azure

Fortanix today announced that a software-as-a-service (SaaS) platform for managing instances of confidential computing on the Microsoft Azure cloud is…

2 weeks ago

4 Things to Do When Running the Iot Zoo

Zoos are fascinating places. In just a few acres you can encounter all kinds of interesting, rare and exotic animals…

4 weeks ago

Three Priorities for IT Operations Continuity During the COVID-19 Pandemic

The world has been turned upside down amidst the COVID-19 pandemic, and organizations that are trying to maintain best IT…

2 months ago

The Linux Foundation Throws Weight Behind Secure Microkernel

The Linux Foundation announced today it will host the seL4 Foundation, the nonprofit organization established by Data61, an arm of…

2 months ago

Taming the Shadow IT Beast and Runaway Spend

Do you know how much IT resources your employees are consuming? According to research conducted by the Everest Group, shadow…

2 months ago

How 5G Mobile Networks Will Change IoT Security

Depending on your location, you might have noticed a new 5G icon on your cell phone recently. The roll-out of…

3 months ago

5G Security: Mitigating Threats in the Era of Hyperspeed and Hyperconnectivity

5G is one of the hottest industry buzzwords right now, and for good reason. Beyond its ability to deliver massive…

3 months ago

5 Password Policies to Up Your Security

Complex passwords can save users from being hacked—any IT admin will tell you that. Plus, countless studies and articles on…

4 months ago

Achieving Full Disk Encryption and PCI Compliance

Full disk encryption (FDE) is a critical security measure in today’s modern networks. With data security being more critical than…

4 months ago

Server Security: Minimizing Risk in 3 Steps

Servers located directly on the internet run one of the highest risks of being compromised. It’s just too easy for…

4 months ago