Although federation divides the work between an identity provider (IdP) and a service provider/relying party (SP/RP)
Browsing: Endpoint security
Who will get swept away and who will discover new lands? Here’s what’s happening in IAM these days and why federating the identity layer
Imperva Ranked Number 352 Fastest Growing Company in North America on Deloitte’s 2013 Technology Fast 500™
Goode Intelligence, the leading research, analysis and consultancy organisation for the mobile security industry
Industry Standard for Cloud Security Now Includes Expanded Controls to Assess Cloud Service Provider Information Security Risks
Mobile applications are more common in the workplace than ever, which undoubtedly provides great opportunity to increase productivity, collaboration, and employee satisfaction.
Organizations have implemented bring your own device (BYOD) policies for even better business productivity, and employees are enjoying the perks of being able to work outside the office space if desired.
Most security professionals agree that we can’t effectively stop malware by blacklisting signatures; the approach used by most antivirus applications.
The certification of a mobile-security sandboxing platform from Good Technology to EAL4+ standards will pave the way for the use of application-isolation techniques to secure mobile and bring your own device
The latest gadgets, such as Google Glass, and a number of others, are gaining a great deal of hype, but as much as they have a great deal of potential, they may also be placing privacy and mobile security at risk.