The Apple Watch, the Moto 360, the Samsung Gear. Whether you have a fixed BYOD policy or not, these wearable…
Browsing: Identity and Access Management (IAM)
As electronics and related code become more integrated into modern vehicles, we are reaching a point where they will require…
Halocore enables SAP customers to identify sensitive data exports with context-aware classification, track and analyze all download activity from SAP applications, and prevent potential…
Latest feature assures you know exactly where your data is, complying with strictest European standards. Zettabox, the European cloud storage…
TechWeek Europe has reported an advertising attack which ran for almost three weeks on major websites such as eBay UK,…
Following the comments made by MI5 Director General Andrew Parker that data encryption technology was creating a situation where police…
Research shows most security breaches are down to people inside the organisation. Workers say this needs to be addressed by…
Android has a major chink in its armor called the Stagefright Android Hack. In this hack, an innocuous looking video-embedded…
Infoblox Introduces First Enterprise-Grade DDI solution with Identity Mapping Infoblox Inc. (NYSE:BLOX), the network control company, announced Infoblox Identity Mapping,…
The world’s biggest maker of routers is fighting a startlingly effective new cyber attack. Security researchers say they have uncovered…