Data is constantly being collected and streamed all around us. From everyday devices like smartphones and televisions, to complex sensors…
Browsing: Identity and Access Management (IAM)
The past few years have seen a steady increase in major hacking incidents, with high-profile breaches at corporations like Target,…
One in three IT decision makers have to fight for stricter security protocols IT decision makers in UK companies say…
Security experts from VASCO Data Security and Lastline commented on the on news the discovery of the first multi-vendor ATM malware targeting cardholders.…
The number of new security threats and issues tied to trends such as mobile access, Bring Your Own Device (BYOD)…
A key aspect of the company’s growth strategy for services and solutions includes a new software-based release of Unisys Stealth…
Data security concerns call for a multi-faceted approach to protecting an organisation’s high-value data throughout its entire lifecycle; encryption technology,…
Smartphones are powerful devices, and a constant reminder that we are “living in the future.” We can take high-resolution photos,…
Chris Mayers, Chief Security Architect, Citrix, commented on the on the Government’s new password guidance. [su_note note_color=”#ffffcc” text_color=”#00000″]Chris Mayers, Chief…
Widespread demand for harsher penalties and enforced data breach detection measures Bit9® + Carbon Black®, the leader in endpoint threat…