As anxiety-inducing as it may sound, you need to run your business under the assumption that a horrifying disaster could…
Browsing: Identity and Access Management (IAM)
Research into the proliferation of fraudulent domains affecting the cybersecurity industry by web security experts High-Tech Bridge has uncovered some…
When Europe’s highest court declared the Safe Harbor agreement invalid in October 2015, you could almost hear the collective gasp…
Should be “Shot at sunrise” is the opinion of U.S. politician Michael C.Burgess, the representative for Texas, when talking about…
As the workforce becomes more mobile and more critical enterprise applications are hosted in the cloud, identity and access management…
Following the huge debacle related to the LinkedIn data breach that came to light last week, Microsoft’s Identity Protection team has…
With cyber security expected to top $101 billion by 2018, the tendency for data centre managers to focus on updating…
Running behind trendy APTs we tend to forget about common-sense approach and holistic risk assessment. Almost 3 terabytes of data stolen…
Security Breaches, Poor Password Habits and Frustrating Customer Experiences Drive Businesses to Prepare for the Death of the Password Gigya,…
NHS bosses have been told to overhaul their computer technology, staff training and corporate governance before two reports on data…