IT News and Trends for CTOs, CIOs and IT Professionals

Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II

On October 16th, 2017, a research paper with the title of “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2” was made publicly available. This paper discusses seven vulnerabilities affecting session key negotiation in both the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities may allow the reinstallation of a […]

Data Management “Hype Cycle” Revealed in Gartner 2017 Report

As data becomes ever more distributed across multiple systems, organizations have to cope with increasingly complex ecosystems and digital business requirements. The “Hype Cycle for Data Management,” developed by Gartner, Inc. is designed to assist CIOs, chief data officers (CDOs) and other senior data analytics specialists understand the maturity of the data management technologies they […]