Following the recent data breach of individual student records at the University of Greenwich please see commentary from SailPoint, Iron Mountain and BMC Software have the…
Browsing: Identity and Access Management (IAM)
With $4.45 billion spent during a major online shopping weekend in November 2015 alone (Fortune), it’s clear that the need…
GOVERNMENT COMMITMENT TO PROTECT CHILDREN FROM ONLINE PORNOGRAPHY Public consultation launched to require age verification for pornographic content online. Under new proposals, companies profiting…
The Secure Chorus Group was announced today to support and promote interoperable, secure communications for enterprise and government. Secure Chorus…
Owing to the fact that cloud computing offers you superb flexibility and scalability, impenetrable security against cyber criminals, greater collaboration…
The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation…
Following this weekend’s news that a teenager has been arrested on suspicion of gaining access to CIA Director John Brennan’s…
No company is immune to the risk of cyber attacks and the resulting loss of customer information. Network security solutions…
Corporate espionage rates were constantly growing, during last few years. Number of corporate secret cases in US courts was doubled…
Industry leader evaluates confidence in seven key security controls required to detect cyber attacks on endpoints Tripwire, Inc., a leading…