Hundreds of store managers exchange confidential information with the help of Intralinks VIA to keep competitive advantage Intralinks® Holdings, Inc.…
Browsing: Identity and access management (IAM)
Security experts from Lieberman Software, STEALTHbits Technologies and Tripwire commenting on reports of a massive new iPhone user data breach. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erin,…
Mobile devices can provide corporate IT departments with a hornet’s nest of security (and support) issues – no matter whether…
Password-Based Authentication No Longer Capable of Meeting Modern Security Demands LaunchKey, the leading mobile authentication platform, today released findings from…
New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration, PCI compliance and scope reduction HP…
New survey reveals fewer than 5% of UK and U.S Millennials believe their digital identity is completely protected by effective…
The California State Auditor’s office has issued a new report “High Risk Update—Information Security” which is available Here. The detailed…
When tallying up the costs of a data breach, it is easy to focus on the bills that have to…
Avast Builds Threat Detection Based on Machine Learning Avast Software, maker of the world’s most trusted PC and mobile security,…
Lack of encryption and weak or shared passwords expose sensitive corporate and customer information Centrify Corporation, the leader in securing identities from…