Intel CEO Brian Krzanich demonstrated Intel-developed designs for wearable devices including smart earbuds with biometric and fitness capabilities,
Browsing: Endpoint Security
So what does 2014 hold for the Internet of Things and information security? We’ll likely see the FTC, led by their Chairwoman, Edith Ramirez,
By correlating the data, Websense has demonstrated how any attacker intercepting this data can create a precise blueprint of the target’s hardware
Smartphone theft has surged in recent years to become a scourge of everyday life, and Kaspersky is warning that this Christmas users need to get protected
With less than a month remaining before 2014, Panda Security announced its predictions for top security trends to watch for in the coming year
Easy Solutions, today unveiled Easy Solutions Mobile, the only solution which transparently protects all of a financial institution’s mobile banking
Mobile shopping adds even more convenience to online shopping as it can be done while on the go. However there are a number of security concerns which are often overlooked by consumers.
Although federation divides the work between an identity provider (IdP) and a service provider/relying party (SP/RP)
Who will get swept away and who will discover new lands? Here’s what’s happening in IAM these days and why federating the identity layer
Imperva Ranked Number 352 Fastest Growing Company in North America on Deloitte’s 2013 Technology Fast 500™