Yahoo announced a new method of authentication for its services that relies solely on an on-demand generated password that is sent to the user’s mobile phone number.
Author: ISBuzz Team
SaaS Portal Eases Compliance Burden by Allowing Companies to Create Customized Control Sets and Compliance Templates in Seconds
Leading commercial law firm, MLP Law, has launched an award to recognise excellence within the UK’s dynamic Telecoms, Media and Technology (TMT) sectors.
Centrify Cloud Expo Europe poll shines light on shadow IT
ESET has conducted a survey on social media of smartphone usage ahead of the Mobile World Congress with interesting conclusions: 9.7% of those surveyed users had their phone lost or stolen in the last 12 months, slightly more than 29% do not lock their smartphone, and almost 20% do not backup the content of their smartphone at all.
Elite Offering Provides Enterprise Customers with Personalized, Dedicated Support from Highly Knowledgeable Technical Account Managers
SoftWatch solutions to the SMB market are aimed to support smooth transition from MS Office to cloud based office and collaborations tools, optimize software license spending and optimize the usage of cloud storage and web conferencing services.
When the first revelations of former contractor Edward Snowden came out, it was a watershed moment for the debate on privacy and surveillance.
Information security compliance requirements are often criticized for their check-box approach to security, and the Payment Card Industry Data Security Standard (PCI DSS) is no exception.
The subject of mobile payments has been hitting the headlines recently, with the launch from Google of Android Pay at Mobile World Congress 2015, marking a defining moment in the future of mobile payments. With the worldwide mobile payment market projected at over 450 million users and a transaction value of more than $721 billion by 2017, there is plenty at stake.